Loading...
Login / Register

Implementing Cisco Cybersecurity Operations (SECOPS) v1.0

The Implementing Cisco Cybersecurity Operations (SECOPS) version 1.0 Cisco®course teaches you to understand how a Security Operations Center (SOC) functions and gives you the introductory-level skills and knowledge need... Show More
Course Prerequisites:
The knowledge and skills necessary before attending this course are: Interconnecting Cisco Networking Devi... Show More
Request a Quote

Only available On-Demand

On-Demand Training

Now you can control your learning experience. When you purchase on-demand training, you gain access to official course content that is available to you from anywhere at any time. This product includes high-quality videos that covers in-depth content, hands-on learning through live lab environments, knowledge checks at the end of the modules and course and helps you build deep technical skills at your own pace.

Please note, Cisco on-demand is currently unavailable, please contact us for any enquiries.
Request a FREE 30-Day Demo

Course Price
On Request

Get Access for
1 Year

Course Content

Course Content

  • Section 1: Defining the Security Operations Center
  • Section 2: Understanding NSM Tools and Data
  • Section 3: Understanding Incident Analysis in a Threat-Centric SOC
  • Section 4: Identifying Resources for Hunting Cyber Threats
  • Section 5: Understanding Event Correlation and Normalization
  • Section 6: Identifying Common Attack Vectors
  • Section 7: Identifying Malicious Activity
  • Section 8: Identifying Patterns of Suspicious Behavior
  • Section 9: Conducting Security Incident Investigations
  • Section 10: Describing the SOC Playbook
  • Section 11: Understanding the SOC Metrics
  • Section 12: Understanding the SOC WMS and Automation
  • Section 13: Describing the Incident Response Plan
  • Section 14: Appendix A –Describing the Computer Security Incident Response Team
  • Section 15: Appendix B –Understanding the use of VERIS

- See fewer details

Labs Outline

This course contains 26 hands-on lab exercises. The labs included in this course are:

  • Discovery Lab 2.11: Explore Network Security Monitoring Tools
  • Discovery Lab 3.14: Investigate Hacker Methodology
  • Discovery Lab 4.11: Hunt Malicious Traffic
  • Discovery Lab 5.7: Correlate Event Logs, PCAPs, and Alerts of an Attack
  • Discovery Lab 6.11: Investigate Browser-Based Attacks
  • Discovery Lab 7.7: Analyze Suspicious DNS Activity
  • Discovery Lab 8.6: Investigate Suspicious Activity Using Security Onion
  • Discovery Lab 9.4: Investigate Advanced Persistent Threats
  • Discovery Lab 10.6 Explore SOC Playbooks

+ See more details

CTU Training Solutions , Updated: October 11th, 2018

Share with friends

Request a Quote



Your Name

Your Surname

Contact Number

Your Email

Company

Which campus would you like to study at?

Your job title

Will your training be sponsored?

Message

The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Join the CTU community

Join the CTU Community Portal and gain access to superior resources.

Join for Free

Thank you for printing this page.
Logo
0861 100 395
[email protected]
www.ctutraining.ac.za

X

Call me Back

Leave your details and we'll contact you back!

Your Name:

Your Email:


Contact Number:

Choose a campus