CISCO CyberOps Associate (200-201)
Detect, Analyze and Respond13 H 55 M
Episodes
Episodes
- Security Concepts
- Overview
- Describe the CIA Triad
- Describe Security Approaches
- Describe Security Tools and Practices
- Describe Threat Actor Types
- Differentiate Security Concepts
- Identify Risk Management Methods
- Describe CVSS Terminology
- Compare Security Deployments
- Compare Access Control Models
- Identify Data Visibility Challenges
- Identify Data Loss from Traffic Profiles
- Use 5-tuple Approach to Isolate a Host
- Compare Detection Methodologies
- Security Monitoring
- Compare Attack Surface and Vulnerability
- Identify tcpdump and NetFlow
- Identify Firewall Data
- Identify Content Filtering Data
- Identify Application Visibility and Control Data
- Identify Technology Impact on Data Visibility
- Know Network Security Data Types
- Describe Network Attacks
- Describe Web Application Attacks
- Describe Social Engineering Attacks
- Describe Evasion and Obfuscation
- Identify Certificate Components
- Host-Based Analysis
- Describe Endpoint-based Attacks
- Identify Windows 10 Components
- Identify Ubuntu Components
- Identify Attribution in an Investigation
- Identify Types of Evidence based on Logs
- Compare Disk Images
- Interpret Output from a Malware Analysis Tool
- Network Intrusion Analysis
- Categorize Intrusion Events
- Identify Source Technology and Events
- Compare Firewall Operations
- Compare Traffic Analysis Techniques
- Extract Files from a TCP Stream
- Identify Intrusion Elements from a PCAP file
- Interpret Artifact Elements from an Event
- Interpret Basic Regular Expressions
- Security Policies and Procedures
- Describe NIST SP 800-86 Concepts
- Describe Security Management Concepts
- Describe SOC Metrics and Scope Analysis
- Identify Protected Data in a Network
- Identify Network and Server Profiling Elements
- Integrate Forensic Elements into Incident Analysis
- Identify Elements of an IRP
Overview
8 M



- Episode Description
- Transcript
This show will help aspiring or current IT professionals seeking the fulfill the job role as an entry or associate-level cybersecurity analyst. It will be valuable to the IT professional who desires to know more about cybersecurity operations in a SOC (Security Operations Center) and ultimately guide the certification seeker pursuing the Cisco Certified CyberOps Associate certification. You will learn about Security Concepts, Monitoring, host-based analysis, network intrusion analysis, and security policies and procedures used by a CyberOps Associate working within a SOC.
Just you? Training a whole team? There's an ITProTV plan that fits.
With more than 5,800 hours of engaging video training for IT professionals, you'll find the courses you and your team need to stay current and get the latest certifications.