Step into the exciting world of cybersecurity, where you’ll defend against cybercrime, outmaneuver cyber espionage, and address a variety of networking threats. As one of the fastest-growing industries, cybersecurity offers you the opportunity to develop sought-after skills and join a Security Operations Center (SOC) team.
This course prepares you for the Cisco Certified CyberOps Associate Certification, equipping you with the essential skills needed for high-demand SOC Analyst roles across various industries.
Discover how SOC teams identify and respond to security incidents, while gaining expertise in security concepts, monitoring, host-based analysis, network intrusion analysis, and security policy procedures. Aligned with the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework, this course ensures consistency in cybersecurity education, training, and workforce development.
Course Curriculum
Module 1: The Danger
Introduction
War Stories
Threat Actors
Threat Impact
The Danger Summary
Module 2: Fighters in the War Against Cybercrime
Introduction
The Modern Security Operations Center
Becoming a Defender
Fighters in the War Against Cybercrime Summary
Module 3: The Windows Operating System
Introduction
Windows History
Windows Architecture and Operations
Windows Configuration and Monitoring
Windows Security
The Windows Operating System Summary
Module 4: Linux Overview
Introduction
Linux Basics
Working in the Linux Shell
Linux Servers and Clients
Basic Server Administration
The Linux File System
Working with the Linux GUI
Working on a Linux Host
Linux Basics Summary
Module 5: Network Protocols
Introduction
Network Communications Process
Communications Protocols
Data Encapsulation
Network Protocols Summary
Module 6: Ethernet and Internet Protocol (IP)
Introduction
Ethernet
IPv4
IP Addressing Basics
Types of IPv4 Addresses
The Default Gateway
IPv6
Ethernet and IP Protocol Summary
Module 7: Connectivity Verification
Introduction
ICMP
Ping and Traceroute Utilities
Connectivity Verification Summary
Module 8: Address Resolution Protocol
Introduction
MAC and IP
ARP
ARP Issues
Address Resolution Protocol Summary
Module 9: The Transport Layer
Introduction
Transport Layer Characteristics
Transport Layer Session Establishment
Transport Layer Reliability
The Transport Layer Summary
Module 10: Network Services
Introduction
DHCP
DNS
NAT
File Transfer and Sharing Services
Email
HTTP
Network Services Summary
Module 11: Network Communication Devices
Introduction
Network Devices
Wireless Communications
Network Communication Devices Summary
Module 12: Network Security Infrastructure
Introduction
Network Topologies
Security Devices
Security Services
Network Security Infrastructure Summary
Module 13: Attackers and Their Tools
Introduction
Who is Attacking Our Network?
Threat Actor Tools
Attackers and Their Tools Summary
Module 14: Common Threats and Attacks
Introduction
Malware
Common Network Attacks – Reconnaissance, Access, and Social Engineering
Network Attacks – Denial of Service, Buffer Overflows, and Evasion