CBRCOR: Performing CyberOps Using Cisco Security - virtual



Kursarrangør: Glasspaper AS
Sted: Nettkurs / Nettstudie
Hele landet
Type:Nettkurs og nettstudie
Studie / yrkesutdanning
Undervisningstid: kl 10:00 - 18:00
Varighet: 5 days
Pris: 49.000
Neste kurs: 09.12.2024 | Vis alle kursdatoer

We provide virtual course about CBRCOR: Performing CyberOps Using Cisco Security Technologies. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) course guides you through cybersecurity operations fundamentals, methods, and automation.

Course description:
The knowledge you gain in this course will prepare you for the role of Information Security Analyst on a Security Operations Center (SOC) team. You will learn foundational concepts and their application in real-world scenarios, and how to leverage playbooks in formulating an Incident Response (IR). The course teaches you how to use automation for security using cloud platforms and a SecDevOps methodology. You will learn the techniques for detecting cyberattacks, analyzing threats, and making appropriate recommendations to improve cybersecurity. This course prepares you for the 350-201 CBRCOR core exam.

Course objectives:
After completing this course you should be able to:
• Describe the types of service coverage within a SOC and operational responsibilities associated with each
• Compare security operations considerations of cloud platforms
• Describe the general methodologies of SOC platforms development, management, and automation
• Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections.
• Describe Zero Trust and associated approaches, as part of asset controls and protections
• Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC.
• Use different types of core security technology platforms for security monitoring, investigation, and response
• Describe the DevOps and SecDevOps processes

• Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, Comma-Separated Values (CSV).
• Describe API authentication mechanisms
• Analyze the approach and strategies of threat detection, during monitoring, investigation, and response
• Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs)
• Interpret the sequence of events during an attack based on analysis of traffic patterns
• Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools).
• Analyze anomalous user and entity behavior (UEBA)
• Perform proactive threat hunting following best practices

Course content:
• Understanding Risk Management and SOC Operations
• Understanding Analytical Processes and Playbooks
• Investigating Packet Captures, Logs, and Traffic Analysis
• Investigating Endpoint and Appliance Logs
• Understanding Cloud Service Model Security Responsibilities
• Understanding Enterprise Environment Assets
• Implementing Threat Tuning
• Threat Research and Threat Intelligence Practices
• Understanding APIs
• Understanding SOC Development and Deployment Models
• Performing Security Analytics and Reports in a SOC
• Malware Forensics Basics
• Threat Hunting Basics
• Performing Incident Investigation and Response

Labs:
• Explore Cisco SecureX Orchestration
• Explore Splunk Phantom Playbooks
• Examine Cisco Firepower Packet Captures and PCAP Analysis
• Validate an Attack and Determine the Incident Response
• Submit a Malicious File to Cisco Threat Grid for Analysis
• Endpoint-Based Attack Scenario Referencing MITRE ATTACK
• Evaluate Assets in a Typical Enterprise Environment
• Explore Cisco Firepower NGFW Access Control Policy and Snort Rules

• Investigate IOCs from Cisco Talos Blog Using Cisco SecureX
• Explore the ThreatConnect Threat Intelligence Platform
• Track the TTPs of a Successful Attack Using a TIP
• Query Cisco Umbrella Using Postman API Client
• Fix a Python API Script
• Create Bash Basic Scripts
• Reverse Engineer Malware
• Perform Threat Hunting
• Conduct an Incident Response

Target audience:
Cybersecurity analysts, engineers, investigators and incident responders

Prerequisites:
Attendees should meet the following pre-requisites:
• Familiarity with UNIX/Linux shells (bash, csh) and shell commands
• Familiarity with the Splunk search and navigation functions
• Basic understanding of scripting using one or more of Python, JavaScript, PHP or similar

Recommended prerequisites:
• CBROPS - Understanding Cisco Cybersecurity Operations Fundamentals
• CCNA - Implementing and Administering Cisco Solutions

Language:
• English course material, english speaking instructor

Certification:
This course is recommended as preparation for the following exam: Exam 350-201 CBRCOR: Performing CyberOps Using Cisco Security Technologies.