CCNA Cyber Ops introduces the core security concepts and skills needed to monitor, detect, analyze and respond to cybercrime, cyberespionage, insider threats, advanced persistent threats, regulatory requirements, and other cybersecurity issues facing organizations. It emphasizes the practical application of the skills needed to maintain and ensure security operational readiness of secure networked systems.
At least 81 hours of instructor led training (usually two – 3 hours sessions a week over 14 weeks)
- Gain understanding and hands-on experience on how to detect and respond to security incidents
- Understand how organizations deal with cybercrime, cyberespionage, insider threats, advanced persistent threats, regulatory requirements, and related issues
- Gain job-ready practical skills for in-demand job roles in cybersecurity operations
What you will learn
- Explain the role of the Cybersecurity Operations Analyst in the enterprise.
- Explain why networks and data are attacked.
- Explain how to prepare for a career in Cybersecurity operation
- Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
- Explain the operation of the Windows Operating System.
- Explain how to secure Windows endpoints.
- Explain the features and characteristics of the Linux Operating System.
- Perform basic operations in the Linux shell.
- Perform basic Linux administration tasks.
- Analyze the operation of network protocols and services.
- Explain how the Ethernet and IP protocols support network communications and operations
- Explain how network services enable network functionality .
- Explain network topologies and the operation of the network infrastructure
- Explain how network devices enable wired and wireless network communication.
- Explain how devices and services are used to enhance network security
- Classify the various types of network attacks.
- Explain how networks are attacked.
- Explain the various types of threats and attacks.
- Use network monitoring tools to identify attacks against network protocols and services.
- Explain network traffic monitoring.
- Explain how TCP/IP vulnerabilities enable network attacks.
- Explain how common network applications and services are vulnerable to attack.
- Use various methods to prevent malicious access to computer networks, hosts, and data.
- Explain approaches to network security defense.
- Use various intelligence sources to locate current security threats.
- Explain the impacts of cryptography on network security monitoring.
- Use tools to encrypt and decrypt data.
- Explain how the public key infrastructure (PKI) supports network security.
- Explain endpoint vulnerabilities and attacks investigation
- Use tools to generate a malware analysis report.
- Classify endpoint vulnerability assessment information.
- Evaluate network security alerts.
- Explain how security technologies affect security monitoring.
- Explain the types of log files used in security monitoring.
- Analyze network intrusion data to identify compromised hosts
- Explain how security-related data is collected.
- Analyze intrusion data to determine the source of an attack.
- Explain how network security incidents are handled by CSIRTs.
- Apply incident response models, such as NIST 800-61r2 to a security incident.
- Use a set of logs to isolate threat actors and recommend an ncident response plan.