Performing CyberOps Using Cisco Security Technologies (CBRCOR)

 

Who should attend

Although there are no mandatory prerequisites, the course is particularly suited for the following audiences:

  • Cybersecurity engineer
  • Cybersecurity investigator
  • Incident manager
  • Incident responder
  • Network engineer
  • SOC analysts currently functioning at entry level with a minimum of 1 year of experience

Prerequisites

Although there are no mandatory prerequisites, to fully benefit from this course, you should have the following knowledge:

  • Familiarity with UNIX/Linux shells (bash, csh) and shell commands
  • Familiarity with the Splunk search and navigation functions
  • Basic understanding of scripting using one or more of Python, JavaScript, PHP or similar.

Recommended Cisco offering that may help you prepare for this course:

Course Objectives

  • Describe the types of service coverage within a SOC and operational responsibilities associated with each
  • Compare security operations considerations of cloud platforms
  • Describe the general methodologies of SOC platforms development, management, and automation
  • Describe asset segmentation, segregation, network segmentation, microsegmentation, and approaches to each, as part of asset controls and protections
  • Describe Zero Trust and associated approaches, as part of asset controls and protections
  • Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC
  • Use different types of core security technology platforms for security monitoring, investigation, and response
  • Describe the DevOps and SecDevOps processes
  • Describe the common data formats (e.g., JavaScript Object Notation (JSON), HTML, XML, and Comma-Separated Values (CSV))
  • Describe API authentication mechanisms
  • Analyze the approach and strategies of threat detection, during monitoring, investigation, and response
  • Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs)
  • Interpret the sequence of events during an attack based on analysis of traffic patterns
  • Describe the different security tools and their limitations for network analysis (e.g., packet capture tools, traffic analysis tools, and network log analysis tools)
  • Analyze anomalous user and entity behavior (UEBA)
  • Perform proactive threat hunting following best practices

Detailed Course Outline

  • Understanding Risk Management and SOC Operations
  • Understanding Analytical Processes and Playbooks
  • Understanding Cloud Service Model Security Responsibilities
  • Understanding Enterprise Environment Assets
  • Understanding APIs
  • Understanding SOC Development and Deployment Models
  • Investigating Packet Captures, Logs, and Traffic Analysis
  • Investigating Endpoint and Appliance Logs
  • Implementing Threat Tuning
  • Threat Research and Threat Intelligence Practices
  • Performing Security Analytics and Reports in a SOC
  • Malware Forensics Basics
  • Threat Hunting Basics
  • Performing Incident Investigation and Response

Prices & Delivery methods

Online Training

Duration
5 days

Price
  • CAD 5,515
  • Cisco Learning Credits: 40
Classroom Training

Duration
5 days

Price
  • Canada: CAD 5,515
  • Cisco Learning Credits: 40

Schedule

Currently there are no training dates scheduled for this course.