Simple play icon Course
Skills

Cisco CyberOps: Analyzing Hosts

by Joe Abraham

Cybersecurity concepts are fundamental pieces of knowledge necessary for a career in the industry. This course will detail many aspects of host-based technologies, components, and malware.

What you'll learn

There is a tremendous skill shortage in the cybersecurity sector of IT that is hindering operations at organizations. In this course, Cisco CyberOps: Analyzing Hosts, you’ll learn the some of the concepts needed to start your journey into the SOC operations realm. First, you’ll explore the various endpoint technologies to secure a host. Next, you’ll discover about components of both Windows and Linux operating systems and how they can be compromised. We’ll also discuss investigation-related terminology and evidence with regards to investigations. Finally, you’ll learn about sandboxes and detonation chambers and the reports that they generate. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.

Course FAQ

What are the prerequisites for this course?

Before beginning the course, you should be familiar with basic IT terminology. This course is primarily for anyone who is new to cybersecurity and wants to learn more about cybersecurity concepts and operations with regards to our hosts.

Why is cybersecurity important?

Cybersecurity is important because it encompasses everything that pertains to protecting our sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries.

What is CyberOps?

Cyber operations (Cyber Ops) is a specialization of information security that is in high demand within areas of the government and military, including the National Security Agency (NSA). If you have an interest in working for the NSA, or a similar organization, certification in Cyber Ops may be the right fit for you.

What is host based security?

DISA HBSS (Host-Based Security System) is the commercial, off-the-shelf (COTS) Endpoint Security software that the Department of Defense uses to monitor, detect, and defend IT assets and systems. McAfee developed this system using the ePO management engine.

What is Linux Operating System?

Just like Windows, iOS, and Mac OS, Linux is an operating system. In fact, one of the most popular platforms on the planet, Android, is powered by the Linux operating system. An operating system is software that manages all of the hardware resources associated with your desktop or laptop. To put it simply, the operating system manages the communication between your software and your hardware. Without the operating system (OS), the software wouldn’t function.

About the author

Joe Abraham, CCIE #62417, is a Cybersecurity Architect working in the public sector space, assisting customers develop and implement functional and secure network architectures. He graduated from Excelsior College with an M.S. in Cybersecurity and a B.S. in Information Technology (Network Management). He currently holds many IT certifications to include CCIE, CISSP, GSEC, and CCNP Security. Joe is a mentor to IT professionals and a blogger who spends his time either with his wife and three child... more

Ready to upskill? Get started