Special Offers | My Account | Log In
  0 items in your cart


Search: Boson Sites | Products
Sale

Preview our new look!

Cisco > Network Security > SECOPS Training

Upcoming Dates:

Don’t see the date you want? Contact us.
Price: $3695

Call 813-925-0700 (opt 2) to request this class.

SECOPS Training

Class Delivery Methods
Request a private class

Contact Us:

813-925-0700 (opt 2)
877-333-EXAM (opt 2)
FAX: 813-925-3957
EMAIL: Boson Training

Full Course List

Request More Information


SECOPS Training

About This IT Training:

Exam Number:
Exam Name:
Certifications: Network Security
Single-User License  

SECOPS Training

The Implementing Cisco Cybersecurity Operations (SECOPS) v1.0 course allows learners to understand how a Security Operations Center (SOC) functions and the introductory-level skills and knowledge needed in this environment. It focuses on the introductory-level skills needed for a SOC Analyst at the associate level. Specifically, understanding basic threat analysis, event correlation, identifying malicious activity, and how to use a playbook for incident response.

Students will learn how a Security Operations Center (SOC) functions and gain the introductory-level skills and knowledge required for success. Students obtain the core skills needed to grasp the associate-level material in the 210-255 (SECOPS), which, when combined with passing the 210-250 SECFND exam, lead to the CCNA Cyber Ops certification.

Prerequisites

  • Skills and knowledge equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 ICND1 and SECFND

What's Included

  • Comprehensive study materials, including official Cisco courseware
  • Remote lab access

Course Objectives

After completing this course, you will be able to:

  • Define a SOC and the various job roles in a SOC
  • Understand SOC infrastructure tools and systems
  • Learn basic incident analysis for a threat centric SOC
  • Explore resources available to assist with an investigation
  • Explain basic event correlation and normalization
  • Describe common attack vectors
  • Learn how to identifying malicious activity
  • Understand the concept of a playbook
  • Describe and explain an incident respond handbook
  • Define types of SOC Metrics
  • Understand SOC Workflow Management system and automation

Course Outline

Module 1: SOC Overview

  • Lesson 1: Defining the Security Operations Center
  • Lesson 2: Understanding NSM Tools and Data
  • Lesson 3: Understanding Incident Analysis in a Threat-Centric SOC
  • Lesson 4: Identifying Resources for Hunting Cyber Threats

Module 2: Security Incident Investigations

  • Lesson 1: Understanding Event Correlation and Normalization
  • Lesson 2 Identifying Common Attack Vectors
  • Lesson 3: Identifying Malicious Activity
  • Lesson 4: Identifying Patterns of Suspicious Behavior
  • Lesson 5: Conducting Security Incident Investigations

Module 3: SOC Operations

  • Lesson 1: Describing the SOC Playbook
  • Lesson 2: Understanding the SOC Metrics
  • Lesson 3: Understanding the SOC WMS and Automation
  • Lesson 4: Describing the Incident Response Plan
  • Lesson 5: Appendix A—Describing the Computer Security Incident Response Team
  • Lesson 6: Appendix B—Understanding the use of VERIS

Labs

  • Lab 1: Explore Network Security Monitoring Tools
  • Discovery 1: Investigate Hacker Methodology
  • Discovery 2: Hunt Malicious Traffic
  • Discovery 3: Correlate Event Logs, PCAPs, and Alerts of an Attack
  • Discovery 4: Investigate Browser-Based Attacks
  • Discovery 5: Analyze Suspicious DNS Activity
  • Discovery 6: Investigate Suspicious Activity Using Security Onion
  • Discovery 7: Investigate Advanced Persistent Threats
  • Discovery 8: Explore SOC Playbooks


Related Products

ASA Essentials
ICER Training
ISE Essentials Training
SASAA Training
SASAC Training
SESA Training
SIPTO Training
SISE Training
UCA Training

Be the first to review this product. If you have used this product, you can review it on your account page. You must be logged in to review products.


CIS-TR-SECOPS-01