Cisco CyberOps Associate (200-201)
Detect, Analyze and Respond13 H 55 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayThis course has a practice test
Episodes
Episodes
- Security Concepts
- Overview
- Describe the CIA Triad
- Describe Security Approaches
- Describe Security Tools and Practices
- Describe Threat Actor Types
- Differentiate Security Concepts
- Identify Risk Management Methods
- Describe CVSS Terminology
- Compare Security Deployments
- Compare Access Control Models
- Identify Data Visibility Challenges
- Identify Data Loss from Traffic Profiles
- Use 5-tuple Approach to Isolate a Host
- Compare Detection Methodologies
- Security Monitoring
- Compare Attack Surface and Vulnerability
- Identify tcpdump and NetFlow
- Identify Firewall Data
- Identify Content Filtering Data
- Identify Application Visibility and Control Data
- Identify Technology Impact on Data Visibility
- Know Network Security Data Types
- Describe Network Attacks
- Describe Web Application Attacks
- Describe Social Engineering Attacks
- Describe Evasion and Obfuscation
- Identify Certificate Components
- Host-Based Analysis
- Describe Endpoint-based Attacks
- Identify Windows 10 Components
- Identify Ubuntu Components
- Identify Attribution in an Investigation
- Identify Types of Evidence based on Logs
- Compare Disk Images
- Interpret Output from a Malware Analysis Tool
- Network Intrusion Analysis
- Categorize Intrusion Events
- Identify Source Technology and Events
- Compare Firewall Operations
- Compare Traffic Analysis Techniques
- Extract Files from a TCP Stream
- Identify Intrusion Elements from a PCAP file
- Interpret Artifact Elements from an Event
- Interpret Basic Regular Expressions
- Security Policies and Procedures
- Describe NIST SP 800-86 Concepts
- Describe Security Management Concepts
- Describe SOC Metrics and Scope Analysis
- Identify Protected Data in a Network
- Identify Network and Server Profiling Elements
- Integrate Forensic Elements into Incident Analysis
- Identify Elements of an IRP
Overview
8 M



- Episode Description
- Transcript
This show will help aspiring or current IT professionals seeking the fulfill the job role as an entry or associate-level cybersecurity analyst. It will be valuable to the IT professional who desires to know more about cybersecurity operations in a SOC (Security Operations Center) and ultimately guide the certification seeker pursuing the Cisco Certified CyberOps Associate certification. You will learn about Security Concepts, Monitoring, host-based analysis, network intrusion analysis, and security policies and procedures used by a CyberOps Associate working within a SOC.