See how Insoft Services is responding to COVID-19

SECOPS 1.0 – Implementing Cisco Cybersecurity Operations

X

Student Registration Form

Thank you for being interested in our training! Fill out this form to pre-book or request information about the delivery options.

* Required

Course Schedule

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.


Schema


Oct 12 - Oct 16, 2020
09:00 - 17:00 (CEST)
Online

Feb 1 - Feb 5, 2021
09:00 - 17:00 (CEST)
Online

Apr 26 - Apr 30, 2021
09:00 - 17:00 (CEST)
Online

Jul 19 - Jul 23, 2021
09:00 - 17:00 (CEST)
Online

Oct 18 - Oct 22, 2021
09:00 - 17:00 (CEST)
Online

  • SECOPS 1.0 – Implementing Cisco Cybersecurity Operations
    5 days  (Instructor Led Online)  |  Network Security

    Course Details

    Sammanfattning

    This course allows learners to understand how a Security Operations Center (SOC) functions and the introductory-level skills and knowledge needed in this environment. It focuses on the introductory-level skills needed for a SOC Analyst at the associate level. Specifically, understanding basic threat analysis, event correlation, identifying malicious activity, and how to use a playbook for incident response.

    MÄlsÀttning

    Upon completion of this course, you will be able to:

    • Define a SOC and the various job roles in a SOC
    • Understand SOC infrastructure tools and systems
    • Learn basic incident analysis for a threat centric SOC
    • Explore resources available to assist with an investigation
    • Explain basic event correlation and normalization
    • Describe common attack vectors
    • Learn how to identifying malicious activity
    • Understand the concept of a playbook
    • Describe and explain an incident respond handbook
    • Define types of SOC Metrics
    • Understand SOC Workflow Management system and automation

    InnehÄll

    Module 1: SOC Overview

    • Lesson 1: Defining the Security Operations Center
    • Lesson 2: Understanding NSM Tools and Data
    • Lesson 3: Understanding Incident Analysis in a Threat-Centric SOC
    • Lesson 4: Identifying Resources for Hunting Cyber Threats

     

    Module 2: Security Incident Investigations

    • Lesson 1: Understanding Event Correlation and Normalization
    • Lesson 2: Identifying Common Attack Vectors
    • Lesson 3: Identifying Malicious Activity
    • Lesson 4: Identifying Patterns of Suspicious Behavior
    • Lesson 5: Conducting Security Incident Investigations

     

    Module 3: SOC Operations

    • Lesson 1: Describing the SOC Playbook
    • Lesson 2: Understanding the SOC Metrics
    • Lesson 3: Understanding the SOC WMS and Automation
    • Lesson 4: Describing the Incident Response Plan
    • Lesson 5: Appendix A—Describing the Computer Security Incident Response Team
    • Lesson 6: Appendix B—Understanding the use of VERIS

    MĂ„lgrupp

    • Security Operations Center – Security Analyst
    • Computer/Network Defense Analysts
    • Computer Network Defense Infrastructure Support Personnel
    • Future Incident Responders and Security Operations Center (SOC) personnel
    • Students beginning a career, entering the cybersecurity field
    • Cisco Channel Partners

    Förkunskaper

    It is recommended, but not required, that students have the following knowledge and skills:

    • Skills and knowledge equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1)
    • Working knowledge of the Windows operating system
    • Working knowledge of Cisco IOS networking and concepts