Implementing Cisco Cybersecurity Operations (SECOPS)


   

Course Description

The Implementing Cisco Cybersecurity Operations (SECOPS) v1.0 course gives you foundation-level knowledge of security incident analysis techniques used in a Security Operations Center (SOC). You will learn how to identify and analyze threats and malicious activity, correlate events, conduct security investigations, use incident playbooks, and learn SOC operations and procedures. This is the second of two courses that prepare you for the Cisco® CCNA® Cyber Ops certification. This certification validates your knowledge and hands-on skills to help handle cybersecurity events as an associate-level member of an SOC team.


Learning Objectives

  • Describe the three common SOC types, tools used by SOC analysts, job roles within the SOC, and incident analysis within a threat-centric SOC
  • Explain security incident investigations, including event correlation and normalization and common attack vectors, and be able to identify malicious and suspicious activities
  • Explain the use of a SOC playbook to assist with investigations, the use of metrics to measure the effectiveness of the SOC, the use of a SOC workflow management system and automation to improve SOC efficiency, and the concepts of an incident response plan

Prerequisites
  • Understanding Cisco Cybersecurity Fundamentals (SECFND)
The following Cisco learning offering can help you meet this prerequisite:
  • CCNA Cyber Ops SECFND #210-250 Official Cert Guide
Who Should Attend
  • IT professionals
  • Any learner interested in entering associate-level cybersecurity roles such as:
    • SOC cybersecurity analysts
    • Computer or network defense analysts
    • Computer network defense infrastructure support personnel
    • Future incident responders and SOC personnel
    • Cisco integrators or partners

Labs

  1. Explore Network Security Monitoring Tools
  2. Investigate Hacker Methodology
  3. Hunt Malicious Traffic
  4. Correlate Event Logs, PCAPs, and Alerts of an Attack
  5. Investigate Browser-Based Attacks
  6. Analyze Suspicious DNS Activity
  7. Investigate Suspicious Activity Using Security Onion
  8. Investigate Advanced Persistent Threats
  9. Explore SOC Playbooks


Course Info

Length: 5 day
Format: Lecture and Lab
Delivery Method: Virtual / Onsite
Max. Capacity: 16

Contact Us

PDF

SECOPS-1.0-DS-EN-20200117 .pdf