Cisco - Certified CyberOps Professional

Duration

Duration:

Just 4 Days

Method

Method:

Classroom / Online / Hybrid

Next date

Next date:

24/6/2024 (Monday)

Overview

On this accelerated Cisco Certified CyberOps Professional course, gives you knowledge and skills beyond simple firewalls and antivirus software and enables you to become a skilled CyberOps professional. This program is designed for mid-career professionals.

In just 4 days, you’ll learn you’ll also learn how to:

  • Learn how to prevent, detect, and respond to cybersecurity threats and breaches
  • Prove your knowledge in cloud computing security, risk management, and threat intelligence analysis
  • Boost up your confidence with tested and relevant skills

To earn a Cisco Certified CyberOps Professional certification, you pass two exams: one that covers core technologies and one concentration exam. Certify your CyberOps skills and demonstrate the knowledge in cybersecurity.

At the end of this course, you’ll sit the Cisco exam, and achieve your Cisco Certified CyberOps Professional certification.

Through Firebrand’s Lecture | Lab | Review methodology, you’ll get certified at twice the speed of the traditional training and get access to courseware, learn from certified instructors, and train in a distraction-free environment.

Audience

This course is ideal for:

  • Network Engineer
  • Network Security Engineers
  • Cyber security Professionals
  • Security Analyst.

Four reasons why you should sit your course with Firebrand Training

  1. You'll be trained and certified faster. Learn more on this 4-day accelerated course. You'll get at least 12 hours a day of quality learning time in a distraction-free environment
  2. Your course is all-inclusive. One simple price covers all course materials, exams, accommodation and meals – so you can focus on learning
  3. Pass first time or train again for free. Your expert instructor will deliver our unique accelerated learning methods, allowing you to learn faster and be in the best possible position to pass first time. In the unlikely event that you don't, it's covered by your Certification Guarantee
  4. Study with an award-winning training provider. We've won the Learning and Performance Institute's "Training Company of the Year" three times. Firebrand is your fastest way to learn, with 134.561 students saving more than one million hours since 2001

Curriculum

Module 1: Fundamentals 20%

  • 1.1 Interpret the components within a playbook
  • 1.2 Determine the tools needed based on a playbook scenario
  • 1.3 Apply the playbook for a common scenario (for example, unauthorized elevation of privilege, DoS and DDoS, website defacement)
  • 1.4 Infer the industry for various compliance standards (for example, PCI, FISMA, FedRAMP, SOC, SOX, PCI, GDPR, Data Privacy, and ISO 27101)
  • 1.5 Describe the concepts and limitations of cyber risk insurance
  • 1.6 Analyse elements of a risk analysis (combination asset, vulnerability, and threat)
  • 1.7 Apply the incident response workflow
  • 1.8 Describe characteristics and areas of improvement using common incident response metrics
  • 1.9 Describe types of cloud environments (for example, IaaS platform)
  • 1.10 Compare security operations considerations of cloud platforms (for example, IaaS, PaaS)

Module 2: Techniques 30%

  • 2.1 Recommend data analytic techniques to meet specific needs or answer specific questions
  • 2.2 Describe the use of hardening machine images for deployment
  • 2.3 Describe the process of evaluating the security posture of an asset
  • 2.4 Evaluate the security controls of an environment, diagnose gaps, and recommend improvement
  • 2.5 Determine resources for industry standards and recommendations for hardening of systems
  • 2.6 Determine patching recommendations, given a scenario
  • 2.7 Recommend services to disable, given a scenario
  • 2.8 Apply segmentation to a network
  • 2.9 Utilize network controls for network hardening
  • 2.10 Determine SecDevOps recommendations (implications)
  • 2.11 Describe use and concepts related to using a Threat Intelligence Platform (TIP) to automate intelligence Apply threat intelligence using tools
  • 2.13 Apply the concepts of data loss, data leakage, data in motion, data in use, and data at rest based on common standards
  • 2.14 Describe the different mechanisms to detect and enforce data loss prevention techniques
  • 2.14.a host-based
  • 2.14.b network-based
  • 2.14.c application-based
  • 2.14.d cloud-based
  • 2.15 Recommend tuning or adapting devices and software across rules, filters, and policies
  • 2.16 Describe the concepts of security data management
  • 2.17 Describe use and concepts of tools for security data analytics
  • 2.18 Recommend workflow from the described issue through escalation and the automation needed for resolution
  • 2.19 Apply dashboard data to communicate with technical, leadership, or executive stakeholders 2.20 Analyse anomalous user and entity behaviour (UEBA)
  • 2.21 Determine the next action based on user behaviour alerts
  • 2.22 Describe tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools)
  • 2.23 Evaluate artifacts and streams in a packet capture file
  • 2.24 Troubleshoot existing detection rules
  • 2.25 Determine the tactics, techniques, and procedures (TTPs) from an attack
  • Module 3: Processes 30%

  • 3.1 Prioritize components in a threat model
  • 3.2 Determine the steps to investigate the common types of cases
  • 3.3 Apply the concepts and sequence of steps in the malware analysis process:
  • 3.3.a Extract and identify samples for analysis (for example, from packet capture or packet analysis tools) 3.3.b Perform reverse engineering
  • 3.3.c Perform dynamic malware analysis using a sandbox environment
  • 3.3.d Identify the need for additional static malware analysis
  • 3.3.e Perform static malware analysis
  • 3.3.f Summarize and share results
  • 3.4 Interpret the sequence of events during an attack based on analysis of traffic patterns
  • 3.5 Determine the steps to investigate potential endpoint intrusion across a variety of platform types (for example, desktop, laptop, IoT, mobile devices)
  • 3.6 Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs), given a scenario
  • 3.7 Determine IOCs in a sandbox environment (includes generating complex indicators)
  • 3.8 Determine the steps to investigate potential data loss from a variety of vectors of modality (for example, cloud, endpoint, server, databases, application), given a scenario
  • 3.9 Recommend the general mitigation steps to address vulnerability issues
  • 3.10 Recommend the next steps for vulnerability triage and risk analysis using industry scoring systems (for example, CVSS) and other techniques
  • Module 4: Automation 20%

  • 4.1 Compare concepts, platforms, and mechanisms of orchestration and automation
  • 4.2 Interpret basic scripts (for example, Python)
  • 4.3 Modify a provided script to automate a security operations task
  • 4.4 Recognize common data formats (for example, JSON, HTML, CSV, XML) 4.5 Determine opportunities for automation and orchestration
  • 4.6 Determine the constraints when consuming APIs (for example, rate limited, timeouts, and payload)
  • 4.7 Explain the common HTTP response codes associated with REST APIs
  • 4.8 Evaluate the parts of an HTTP response (response code, headers, body)
  • 4.9 Interpret API authentication mechanisms: basic, custom token, and API keys
  • 4.10 Utilize Bash commands (file management, directory navigation, and environmental variables)
  • 4.11 Describe components of a CI/CD pipeline
  • 4.12 Apply the principles of DevOps practices
  • 4.13 Describe the principles of Infrastructure as Code
  • Exam Track

    At the end of this accelerated course, you’ll sit the following exam at the Firebrand Training centre, covered by your Certification Guarantee:

    Cisco Certified CyberOps Professional exam 350-201 & 300-215

    • Duration: 120-minute

    What's Included

    Your accelerated course includes:

    • Accommodation *
    • Meals, unlimited snacks, beverages, tea and coffee *
    • On-site exams **
    • Exam vouchers **
    • Practice tests **
    • Certification Guarantee ***
    • Courseware
    • Up-to 12 hours of instructor-led training each day
    • 24-hour lab access
    • Digital courseware **
    • * For residential training only. Accommodation is included from the night before the course starts. This doesn't apply for online courses.
    • ** Some exceptions apply. Please refer to the Exam Track or speak with our experts
    • *** Pass first time or train again free as many times as it takes, unlimited for 1 year. Just pay for accommodation, exams, and incidental costs.

    Prerequisites

    Before attending this accelerated course, you should have:

    • A good understanding of the exam topics before taking the exam.
    • Three to five years of experience implementing enterprise networking solutions.

    Are you ready to get certified in record time?

    We interview all applicants for the course on their technical background, degrees and certifications held, and general suitability. If you get through this screening process, it means you stand a great chance of passing.

    Firebrand Training is an immersive training environment. You must be committed to the course. The above prerequisites are guidelines, but many students with less experience have other background or traits that have enabled their success in accelerated training through Firebrand Training.

    If you have any doubts as to whether you meet the pre-requisites please call 09 - 31 587 431 and speak to one of our enrolment consultants, who can help you with a training plan.

    Reviews

    We've currently trained 134.561 students in 12 years. We asked them all to review our Accelerated Learning. Currently,
    96,41% have said Firebrand exceeded their expectations:

    "Really enjoyed the course. It was thoroughly taught and in depth. Made sure there was plenty of opportunities to ask questions and then spent time explaining the answers to the questions making sure everyone understood the content both online and in person."
    Anonymous. (9/10/2023 (Monday) to 14/10/2023 (Saturday))

    "Easy to connect and follow on distance. Almost feels like I'm in the classroom. The camera and the sharing screen interacts very well. No matter the exam result. Thank you tutor!"
    IG. (9/10/2023 (Monday) to 14/10/2023 (Saturday))

    "Great teacher, very knowledgeable in all areas of Networking, his way of instructing is truly unique, explaining things in great details to the enth degree is what you need on a course like the and the tutor exceeded expectations, I would definitely recommend the Firebrand CCNA training to any of my fellow IT colleagues."
    Cameron Tonkin, Semperian. (9/10/2023 (Monday) to 14/10/2023 (Saturday))

    "The organisation of the course was very professional. The course was well delivered, and included detailed explanation of all topics."
    CF. (9/10/2023 (Monday) to 14/10/2023 (Saturday))

    "Patient, knowledgeable, humorous and great instructor. It's a long course, but he made it much more manageable with regular breaks, a mix of slides and whiteboards, and real-world examples and analogies."
    JP. (9/10/2023 (Monday) to 14/10/2023 (Saturday))

    Course Dates

    Start

    Finish

    Status

    Location

    Book now

    19/2/2024 (Monday)

    22/2/2024 (Thursday)

    Finished - Leave feedback

    -

     

    24/6/2024 (Monday)

    27/6/2024 (Thursday)

    Wait list

    Nationwide

     

    5/8/2024 (Monday)

    8/8/2024 (Thursday)

    Limited availability

    Nationwide

     

    16/9/2024 (Monday)

    19/9/2024 (Thursday)

    Open

    Nationwide

     

    28/10/2024 (Monday)

    31/10/2024 (Thursday)

    Open

    Nationwide

     

    9/12/2024 (Monday)

    12/12/2024 (Thursday)

    Open

    Nationwide

     

    Latest Reviews from our students