Implementing Cisco Cybersecurity Operations (SECOPS) v1.0 - CTU Training Solutions

Implementing Cisco Cybersecurity Operations (SECOPS) v1.0

The Implementing Cisco Cybersecurity Operations (SECOPS) version 1.0 Cisco®course teaches you to understand how a Security Operations Center (SOC) functions and gives you the introductory-level skills and knowledge needed in this environment. You learn core skills for an SOC analyst at the associate level, understanding basic threat analysis and event correlation, identifying malicious activity, and using a playbook for incident response. In addition, you gain knowledge on identifying resources for hunting cyber threats, common attack vectors, malicious activity, and patterns of suspicious behaviour, and on conducting security incident investigations
Course Prerequisites:
The knowledge and skills necessary before attending this course are: Interconnecting Cisco Networking Devi... Show More
Request A Quote

Only available On-Demand

On-Demand Training

Now you can control your learning experience. When you purchase on-demand training, you gain access to official course content that is available to you from anywhere at any time. This product includes high-quality videos that covers in-depth content, hands-on learning through live lab environments, knowledge checks at the end of the modules and course and helps you build deep technical skills at your own pace.

Please note, Cisco on-demand is currently unavailable, please contact us for any enquiries.
Request a FREE 30-Day Demo

Course Price
On Request

Get Access for
1 Year

Course Content

Course Content

  • Section 1: Defining the Security Operations Center
  • Section 2: Understanding NSM Tools and Data
  • Section 3: Understanding Incident Analysis in a Threat-Centric SOC
  • Section 4: Identifying Resources for Hunting Cyber Threats
  • Section 5: Understanding Event Correlation and Normalization
  • Section 6: Identifying Common Attack Vectors
  • Section 7: Identifying Malicious Activity
  • Section 8: Identifying Patterns of Suspicious Behavior
  • Section 9: Conducting Security Incident Investigations
  • Section 10: Describing the SOC Playbook
  • Section 11: Understanding the SOC Metrics
  • Section 12: Understanding the SOC WMS and Automation
  • Section 13: Describing the Incident Response Plan
  • Section 14: Appendix A –Describing the Computer Security Incident Response Team
  • Section 15: Appendix B –Understanding the use of VERIS

- See fewer details

Labs Outline

This course contains 26 hands-on lab exercises. The labs included in this course are:

  • Discovery Lab 2.11: Explore Network Security Monitoring Tools
  • Discovery Lab 3.14: Investigate Hacker Methodology
  • Discovery Lab 4.11: Hunt Malicious Traffic
  • Discovery Lab 5.7: Correlate Event Logs, PCAPs, and Alerts of an Attack
  • Discovery Lab 6.11: Investigate Browser-Based Attacks
  • Discovery Lab 7.7: Analyze Suspicious DNS Activity
  • Discovery Lab 8.6: Investigate Suspicious Activity Using Security Onion
  • Discovery Lab 9.4: Investigate Advanced Persistent Threats
  • Discovery Lab 10.6 Explore SOC Playbooks

+ See more details

CTU Training Solutions , Updated: October 11th, 2018

Request A Quote

The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Open chat
Need Help?
How can we assist you today?