Performing CyberOps Using Cisco Security Technologies (CBRCOR)

Performing CyberOps Using Cisco Security Technologies (CBRCOR)

About Education

Performing CyberOps Using Cisco Security Technologies (CBRCOR) training provides information on the fundamentals, methods and automation techniques of cybersecurity operations. This course is a Security Operations Center (SOC) in your team Information Security Analyst helps you prepare for the role. During the training, you will create playbooks that can be used in incident response (IR) processes, provide security automation via cloud platforms and SecDevOps You will also learn techniques for detecting cyber attacks, analyzing threats, and making appropriate recommendations to improve cybersecurity.

Prerequisites

Although there are no mandatory prerequisites, it is recommended that you have the following knowledge and skills:

  • UNIX/Linux Familiarity with shells (bash, csh) and shell commands
  • Splunk familiarity with search and navigation functions
  • Basic scripting knowledge in Python, JavaScript, PHP or similar language

The following courses from Cisco can help you prepare for this training:

  • Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
  • Implementing and Administering Cisco Solutions (CCNA)

Üçüncü parti kaynaklar:

  • Splunk Fundamentals 1
  • Blue Team Handbook: Incident Response Edition – Don Murdoch
  • Threat Modeling: Designing for Security – Adam Shostack
  • Red Team Field Manual – Ben Clark
  • Blue Team Field Manual – Alan J. White
  • Purple Team Field Manual – Tim Bryant
  • Applied Network Security and Monitoring – Chris Sanders, Jason Smith

Duration of Training

  • Classroom training with instructor: 5 days (with practical laboratory work)
  • Training with a virtual instructor: 5 days (with online classes and practical lab work)

Who Should Participate?

This training is particularly suitable for those working in the following positions:

  • Cybersecurity engineers
  • Cybersecurity researchers
  • Incident managers
  • Incident response teams
  • Network engineers
  • SOC analysts (entry-level professionals with at least 1 year of experience)

Educational Content

  1. Understanding Risk Management and SOC Operations
  2. Learning About Analytical Processes and Playbooks
  3. Review Packet Captures, Logs and Traffic Analysis
  4. Examining Endpoint and Device Logs
  5. Understanding Security Responsibilities in Cloud Service Models
  6. Understanding Corporate Environmental Assets
  7. Applying Threat Settings
  8. Threat Research and Threat Intelligence Applications
  9. Understanding APIs
  10. Understanding SOC Development and Deployment Models
  11. Security Analytics and Reporting in the SOC
  12. Malware Forensics Basics
  13. Threat Hunting Basics
  14. Conducting Incident Investigation and Response

What You Will Gain at the End of Training

At the end of the training:

  • You will be able to implement security analytics and incident response processes in SOC environments.
  • You will be able to detect and analyze cyber attacks and threats, and provide reporting and improvement suggestions.
  • You will be able to effectively implement security automation solutions using the SecDevOps methodology.
Trainings

View more trainings

Contact Us

Write Your Requirements and We Will Contact You

We are happy to answer your questions and help you determine which of our services best suits your needs.

Advantages
Then what happens?
1

We will schedule a call at your convenience

2

We are having an exploratory and advisory meeting

3

We are preparing an offer

Consult Us