Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0
Course duration
● Instructor-led training: 5 days in the classroom with hands-on practice, plus the equivalent of 3 days of self-
study material
● Virtual instructor-led training: 5 days of virtual instructor lead classes with hands-on practice, plus the
equivalent of 3 days of self-study material
● E-learning: Equivalent of 5 days of content with videos, practice, and challenge plus 3 days of self-study
material
● Learn the fundamental skills, techniques, technologies, and the hands-on practice necessary to prevent and
defend against cyberattacks as part of a SOC team
● Prepare for the 200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
exam which earns the Cisco Certified CyberOps Associate certification
● Earn 30 Continuing Education Credits toward recertification
.
Course overview
How to enroll
E-learning
● To buy a single e-learning license, visit the Cisco Learning Network Store.
● For more than one license, or a learning library subscription, contact us at learning-bdm@cisco.com.
Instructor-led training
● Find a class at the Cisco Learning Locator.
● Arrange training at your location through Cisco Private Group Training.
Technology areas
● CyberOps
Course details
Objectives
After taking this course, you should be able to:
● Explain how a Security Operations Center (SOC) operates and describe the different types of services that
are performed from a Tier 1 SOC analyst’s perspective.
● Explain Network Security Monitoring (NSM) tools that are available to the network security analyst.
● Explain the data that is available to the network security analyst.
● Describe the basic concepts and uses of cryptography.
● Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts.
● Understand common endpoint security technologies.
● Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by
threat actors.
● Identify resources for hunting cyber threats.
● Explain the need for event data normalization and event correlation.
● Identify the common attack vectors.
● Identify malicious activities.
● Identify patterns of suspicious behaviors.
● Conduct security incident investigations.
● Explain the use of a typical playbook in the SOC.
● Explain the use of SOC metrics to measure the effectiveness of the SOC.
● Explain the use of a workflow management system and automation to improve the effectiveness of the
SOC.
● Describe a typical incident response plan and the functions of a typical Computer Security Incident
Response Team (CSIRT).
● Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security
incidents in a standard format.
Page 2 of 4
Course overview
Prerequisites
Before taking this course, you should have the following knowledge and skills:
Outline
● Defining the Security Operations Center
● Understanding Network Infrastructure and Network Security Monitoring Tools
● Exploring Data Type Categories
● Understanding Basic Cryptography Concepts
● Understanding Common TCP/IP Attacks
● Understanding Endpoint Security Technologies
● Understanding Incident Analysis in a Threat-Centric SOC
● Identifying Resources for Hunting Cyber Threats
● Understanding Event Correlation and Normalization
● Identifying Common Attack Vectors
● Identifying Malicious Activity
● Identifying Patterns of Suspicious Behavior
● Conducting Security Incident Investigations
● Using a Playbook Model to Organize Security Monitoring
● Understanding SOC Metrics
● Understanding SOC Workflow and Automation
● Describing Incident Response
● Understanding the Use of VERIS
● Understanding Windows Operating System Basics
● Understanding Linux Operating System Basics
Page 3 of 4
Course overview
Lab outline
● Use NSM Tools to Analyze Data Categories
● Explore Cryptographic Technologies
● Explore TCP/IP Attacks
● Explore Endpoint Security
● Investigate Hacker Methodology
● Hunt Malicious Traffic
● Correlate Event Logs, Packet Captures (PCAPs), and Alerts of an Attack
● Investigate Browser-Based Attacks
● Analyze Suspicious Domain Name System (DNS) Activity
● Explore Security Data for Analysis
● Investigate Suspicious Activity Using Security Onion
● Investigate Advanced Persistent Threats
● Explore SOC Playbooks
● Explore the Windows Operating System
● Explore the Linux Operating System
© 2021 Cisco and/or its affiliates. All rights reserved. CBROPS 1-0 C22-743724-01 01/21
Page 4 of 4