Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts

Go to class
Write Review

Free Online Course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts provided by LinkedIn Learning is a comprehensive online course, which lasts for 2-3 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts is taught by Lisa Bock.

Overview
  • Cybersecurity specialists are in high demand. This course prepares you to fill these roles as it covers the Security Concepts portion of the Cisco CBROPS exam.

Syllabus
  • Introduction

    • Defending the network
    • Prepare for Cisco CBROPS exam
    • Setting up your test environment
    1. Exploring Security Concepts
    • Recognizing today’s threats
    • Understanding the threat actor
    • Outlining the CIA triad
    • Having zero trust
    • Exploring risk
    • Analyzing risk
    • Challenge: Overview of malware
    • Solution: Overview of malware
    2. Assessing Vulnerabilities
    • Using the CVSS
    • Interpreting CVSS metric groups
    • Understanding the CVE and the NVD
    • Challenge: Temporal metric group
    • Solution: Temporal metric group
    3. Controlling Access
    • Using the principle of least privilege
    • Defining access control
    • Comparing access control models
    • Summarizing triple-A security
    • Verifying authentication
    • Granting authorization
    • Accounting and logging activity
    • Challenge: Network diagram
    • Solution: Network diagram
    4. Understanding the Threats
    • Recognizing the complexity of today’s environment
    • Leveraging threat intelligence
    • Hunting threats
    • Analyzing malware
    • Dissecting malware using reverse engineering
    • Detecting anomalies using the sliding window
    • Comparing detection methods
    • Using five-tuple log analysis
    • Monitoring data loss using traffic profiles
    5. Managing Risk and Preventing Data Loss
    • Identifying challenges of data visibility
    • Comparing security deployments
    • Using agentless or agent-based methods
    • Utilizing SIEM, SOAR, and log management
    • Employing runbook automation
    • Exploring Nmap
    • Challenge: Using Nmap
    • Solution: Using Nmap
    Conclusion
    • Next steps