About Education
Performing CyberOps Using Cisco Security Technologies (CBRCOR) training provides information on the fundamentals, methods and automation techniques of cybersecurity operations. This course is a Security Operations Center (SOC) in your team Information Security Analyst helps you prepare for the role. During the training, you will create playbooks that can be used in incident response (IR) processes, provide security automation via cloud platforms and SecDevOps You will also learn techniques for detecting cyber attacks, analyzing threats, and making appropriate recommendations to improve cybersecurity.
Prerequisites
Although there are no mandatory prerequisites, it is recommended that you have the following knowledge and skills:
- UNIX/Linux Familiarity with shells (bash, csh) and shell commands
- Splunk familiarity with search and navigation functions
- Basic scripting knowledge in Python, JavaScript, PHP or similar language
The following courses from Cisco can help you prepare for this training:
- Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
- Implementing and Administering Cisco Solutions (CCNA)
Üçüncü parti kaynaklar:
- Splunk Fundamentals 1
- Blue Team Handbook: Incident Response Edition – Don Murdoch
- Threat Modeling: Designing for Security – Adam Shostack
- Red Team Field Manual – Ben Clark
- Blue Team Field Manual – Alan J. White
- Purple Team Field Manual – Tim Bryant
- Applied Network Security and Monitoring – Chris Sanders, Jason Smith
Duration of Training
- Classroom training with instructor: 5 days (with practical laboratory work)
- Training with a virtual instructor: 5 days (with online classes and practical lab work)
Who Should Participate?
This training is particularly suitable for those working in the following positions:
- Cybersecurity engineers
- Cybersecurity researchers
- Incident managers
- Incident response teams
- Network engineers
- SOC analysts (entry-level professionals with at least 1 year of experience)
Educational Content
- Understanding Risk Management and SOC Operations
- Learning About Analytical Processes and Playbooks
- Review Packet Captures, Logs and Traffic Analysis
- Examining Endpoint and Device Logs
- Understanding Security Responsibilities in Cloud Service Models
- Understanding Corporate Environmental Assets
- Applying Threat Settings
- Threat Research and Threat Intelligence Applications
- Understanding APIs
- Understanding SOC Development and Deployment Models
- Security Analytics and Reporting in the SOC
- Malware Forensics Basics
- Threat Hunting Basics
- Conducting Incident Investigation and Response
What You Will Gain at the End of Training
At the end of the training:
- You will be able to implement security analytics and incident response processes in SOC environments.
- You will be able to detect and analyze cyber attacks and threats, and provide reporting and improvement suggestions.
- You will be able to effectively implement security automation solutions using the SecDevOps methodology.