O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CCNA Cyber Ops SECOPS 210-255

Video Description

Overview

More than nine hours of video instruction on configuration and troubleshooting tasks to prepare you for the Cisco CCNA Cyber Ops SECOPS 210-255 certification exam.

Description

CCNA Cyber Ops SECOPS 210-255LiveLessons is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-255 SECOPS exam. This product walks through each topic of the Implementing Cisco Cybersecurity Operations exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as a Security Operations Center (SOC) Security Analyst.

CCNA Cyber Ops SECOPS 210-255 contains more than nine hours of instruction with 11 lessons. The videos consist of live video training, video screencasts, and demos. Video instruction throughout offers detailed explanations, tips, and design recommendations. The Complete Video Couse Premium Edition also comes with:

  • Lesson quizzes to help you test yourself on concepts and commands
  • Interactive exercises so you can put your knowledge to the test
  • A full practice exam delivered in the Pearson Test Prep Engine

Major topics include:

  • Endpoint Threat Analysis and Computer Forensics

  • Network Intrusion Analysis

  • Incident Response

  • Data and Event Analysis

  • Incident Handling

Skill Level

  • Beginning to intermediate

What You Will Learn

  • Presents real-world solutions for understand Cisco's threat analysis and incident response solution
  • Covers all of the objectives in the CCNA Cyber Ops exam
  • Easy to follow demonstrations of cybersecurity tools, products, and solutions
  • Scenarios offered to help learners understand real-world applications

Who Should Take This Course

Anyone who wants to obtain their CCNA Cyber Ops certification. This includes security professionals interested in learning how to develop, manage, or improve a security operations center, a CSIRT, PSIRT, or to become a cyber security incident response expert. Anyone wishing to take the CCNA CyberOps exam would also benefit from viewing this course.

Course Requirements

The video course assumes that the learner has the skills to navigate the user interface of a PC running Windows, Mac or Linux and who has completed typical high school-level math courses (mainly that the reader has been exposed to binary math). The course also assumes that the reader has used PCs connected to either a home network or a network inside a school or company, but that the reader might not understand anything about the network to which the PC was connected. It is also assumes that the reader knows how to use typical Internet applications, primarily web browsers and email clients.


Table of Contents

  1. Introduction
    1. CCNA Cyber Ops SECOPS 210-255: Introduction 00:01:48
  2. Lesson 1: Threat Analysis
    1. Learning objectives 00:00:25
    2. 1.1 Understanding Risk Analysis 00:03:30
    3. 1.2 Understanding the Common Vulnerability Scoring System (CVSS) 00:10:11
    4. 1.3 Interpreting Malware Analysis Tool Output 00:05:26
  3. Lesson 2: Forensics
    1. Learning objectives 00:00:35
    2. 2.1 Examining Types of Evidence 00:07:41
    3. 2.2 Surveying Windows Forensics: Application Processes, Threads, and Vulnerabilities 00:03:37
    4. 2.3 Surveying Windows Forensics: Memory 00:05:55
    5. 2.4 Surveying Windows Forensics: The Windows Registry 00:07:15
    6. 2.5 Surveying Windows Forensics: Hard Drives, FAT, and NTFS 00:08:18
    7. 2.6 Surveying Linux Forensics 00:11:19
    8. 2.7 Understanding Evidence Collection 00:13:48
    9. 2.8 Handling Evidence 00:04:38
    10. 2.9 Examining Asset and Threat Actor Attribution 00:05:25
  4. Lesson 3: Intrusion Analysis
    1. Learning objectives 00:00:31
    2. 3.1 Introducing Intrusion Analysis Fundamentals 00:08:13
    3. 3.2 Examining Packet Captures 00:05:36
    4. 3.3 Examining Protocol Headers 00:02:18
    5. 3.4 Analyzing Security Device Data 00:05:22
    6. 3.5 Differentiating False Positives, False Negatives, True Positives, and True Negatives 00:02:50
  5. Lesson 4: NetFlow for Cyber Security
    1. Learning objectives 00:00:34
    2. 4.1 Introducing NetFlow 00:04:14
    3. 4.2 Comparing NetFlow Versions 00:02:52
    4. 4.3 Understanding NetFlow for Cyber Security and Incident Response 00:09:12
    5. 4.4 Examining NetFlow Analysis Tools 00:09:12
    6. 4.5 Introducing IPFIX 00:07:23
  6. Lesson 5: Introduction to Incident Response
    1. Learning objectives 00:00:25
    2. 5.1 Scoping the Incident Response Plan and Process 00:11:34
    3. 5.2 Understanding Information Sharing and Coordination 00:02:54
    4. 5.3 Identifying the Incident Response Team Structure 00:01:52
  7. Lesson 6: Incident Response Teams
    1. Learning objectives 00:00:28
    2. 6.1 Analyzing Computer Incident Response Teams (CSIRTs) 00:08:25
    3. 6.2 Analyzing Product Security Incident Response Teams (PSIRTs) 00:10:50
    4. 6.3 Surveying Coordination Centers 00:03:41
    5. 6.4 Analyzing Managed Security Service Providers Incident Response Teams 00:03:01
  8. Lesson 7: Compliance Frameworks
    1. Learning objectives 00:00:20
    2. 7.1 Considering PCI-DSS 00:09:04
    3. 7.2 Considering HIPAA 00:05:25
    4. 7.3 Considering SOX 00:08:25
  9. Lesson 8: Network and Host Profiling
    1. Learning objectives 00:00:19
    2. 8.1 Understanding Network Profiling 00:07:32
    3. 8.2 Understanding Host Profiling 00:06:25
  10. Lesson 9: Data and Event Analysis
    1. Learning objectives 00:00:35
    2. 9.1 Understanding Data Normalization 00:03:00
    3. 9.2 Deconstructing Universal Data Formats 00:03:08
    4. 9.3 Understanding the 5-tuple Correlation 00:02:10
    5. 9.4 Performing DNS Analysis 00:01:32
    6. 9.5 Performing Web Log Analysis 00:04:20
    7. 9.6 Performing Deterministic and Probabilistic Analysis 00:01:59
  11. Lesson 10: Intrusion Event Categories
    1. Learning objectives 00:00:35
    2. 10.1 Identifying and Mitigating Reconnaissance 00:08:34
    3. 10.2 Identifying and Mitigating Weaponization 00:02:35
    4. 10.3 Identifying and Mitigating Delivery 00:02:05
    5. 10.4 Identifying and Mitigating Exploitation 00:01:03
    6. 10.5 Identifying and Mitigating Installation 00:02:50
    7. 10.6 Identifying and Mitigating Command and Control 00:01:40
    8. 10.7 Understanding Action on Objectives 00:02:18
  12. Lesson 11: The Incident Handling Process
    1. Learning objectives 00:00:48
    2. 11.1 Introducing the Vocabulary for Event Recording and Incident Sharing (VERIS) 00:02:14
    3. 11.2 Applying the VERIS Schema to Incident Handling 00:04:29
    4. 11.3 Surveying the VERIS Incident Recording Tool and Other VERIS Resources 00:01:31
  13. Summary
    1. CCNA Cyber Ops SECOPS 210-255: Summary 00:01:04