CCNA Cyber Ops 210-255 (SECOPS) – Matt Carey
$9.00
This course will teach you how to pass the second of the two required exams to achieve the associate-level CCNA Cyber Ops certification.The SECOPS course improves a candidate’s knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a SOC.
- Description
- Reviews (0)
Description
CCNA Cyber Ops 210-255 (SECOPS) – Matt Carey
Lifetime support – Download unlimited when you buy CCNA Cyber Ops 210-255 (SECOPS) – Matt Carey Course at Course Farm. The market leader in online learning – Offers a variety of diverse topics: Internet Marketing, Forex & Trading, NLP & Hypnosis, SEO – Traffic, …
This course will teach you how to pass the second of the two required exams to achieve the associate-level CCNA Cyber Ops certification.The SECOPS course improves a candidate’s knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a SOC.
Master the CCNA CyberOps 210-255 (SECOPS) exam topics
- Endpoint Threat Analysis and Computer Forensics
- Network Intrusion Analysis
- Incident Response
- Data and Event Analysis
- Incident Handling
Course Curriculum
Cisco CCNA Cyber Ops 210-255 (SECOPS)
- Introduction (0:34)
Endpoint Threat Analysis and Computer Forensics
- Malware Analysis Tool Report (2:26)
- CVSS 3.0 (6:33)
- Microsoft Windows File System (4:00)
- Linux File System (2:04)
- Evidence and Attribution (2:26)
Network Intrusion Analysis
- Common Artifact Elements and Protocol Headers (2:14)
- Security Analysis with Wireshark (2:39)
- NetFlow v5 and Security Events (0:22)
- Map Events to Source Technologies (1:58)
- True or False? (1:56)
- Impact Flags with the Firepower Management Center (FMC) (1:13)
- Interpret Basic Regular Expressions (6:23)
Incident Response
- NIST.SP800-61 r2 (4:56)
- CSIRT (2:31)
- Network Profiling (9:28)
- Server Profiling (4:38)
- PCI (2:18)
- HIPAA (1:50)
- SOX (1:25)
Data and Event Analysis
- Data Normalization (1:53)
- Interpret Common Data Values (1:37)
- 5-tuple (2:20)
- Retrospective Analysis (1:52)
- Threat Analysis (4:18)
- Correlation Rules (5:13)
- Deterministic and Probabilistic Analysis
Incident Handling
- Cyber Kill Chain Model (3:19)
Reviews
There are no reviews yet.