top of page

Related Courses

CISCO CYBEROPS ASSOCIATE CBROPS 200-201 Video Training Course & PDF Guides DOWNL

CISCO CYBEROPS ASSOCIATE CBROPS 200-201 Video Training Course & PDF Guides DOWNLOAD

 

 

Duration :  10+ Hours 

 

Size: 16.5 GB (5 PART + Bonus Course)

 

PART-01

 

01 Cisco_CyberOps_Associate_CBROPS_200-201_-_Introduction

02 Module_introduction

03 Learning_objectives

04 1.1_Describing_the_CIA_Triad

05 1.2_Comparing_Security_Deployments_-_Network_Endpoint_and_Application_Security_Systems

06 1.3_Comparing_Security_Deployments_-_Agentless_and_Agent-based_Protections

07 1.4_Comparing_Security_Deployments_-_Legacy_Antivirus_and_Antimalware

08 1.5_Comparing_Security_Deployments_-_SIEM_SOAR_and_Log_Management

09 1.6_Defining_Threat_Intelligence

10 1.7_Defining_Threat_Hunting

11 1.8_Understanding_Malware_Analysis

12 1.9_Interpreting_the_Output_Report_of_a_Malware_Analysis_Tool

13 1.10_Understanding_the_Different_Threat_Actor_Types

14 1.11_Defining_Run_Book_Automation_RBA

15 1.12_Defining_Reverse_Engineering

16 1.13_Understanding_the_Sliding_Window_Anomaly_Detection

17 Learning_objectives

18 2.1_Performing_Risk_Assessment

19 2.2_Comparing_Threats_Vulnerabilities_and_Exploits

20 2.3_Understanding_Authentication_Authorization_and_Accounting

21 2.4_Examining_the_Access_Control_Process_-_Terminology_and_Data_Classification

22 2.5_Examining_the_Access_Control_Process_-_Data_States_and_Policy_Roles

23 2.6_Examining_the_Access_Control_Process_-_Security_and_Access_Control_Classification

24 2.7_Understanding_Discretionary_Access_Control

25 2.8_Understanding_Mandatory_Access_Control

26 2.9_Understanding_Role-based_Access_Control

27 2.10_Understanding_Attribute-based_Access_Control

28 2.11_Understanding_Rule-based_Access_Control

29 2.12_Understanding_Time-based_Access_Control

30 Learning_objectives

31 3.1_Surveying_Types_of_Vulnerabilities

32 3.2_Understanding_Passive_Reconnaissance_and_Social_Engineering

 

 

PART-02

 

 

33 3.3_Understanding_Active_Reconnaissance_Port_Scanning_and_Host_Profiling

34 3.4_Understanding_Privilege_Escalation_and_Code_Execution_Attacks

35 3.5_Understanding_Backdoors_and_Man-in-the-Middle_Attacks

36 3.6_Understanding_Denial_of_Service_Attacks

37 3.7_Surveying_Attack_Methods_for_Data_Exfiltration

38 3.8_Understanding_ARP_Cache_Poisoning_and_Route_Manipulation_Attacks

39 3.9_Understanding_Password_Attacks

40 3.10_Understanding_Wireless_Attacks

41 3.11_Exploring_Security_Evasion_Techniques

42 3.12_Identifying_the_Challenges_of_Data_Visibility_in_Detection

43 3.13_Identifying_Potential_Data_Loss_from_Provided_Traffic_Profiles

44 3.14_Comparing_Rule-based_Detection_vs._Behavioral_and_Statistical_Detection

45 Learning_objectives

46 4.1_Understanding_the_Basic_Components_of_Cryptography

47 4.2_Introducing_Public_Key_Infrastructure

48 4.3_Deciphering_Encryption_Algorithms

49 4.4_Understanding_Hashing_Algorithms

50 4.5_Examining_Secure_Socket_Layer_and_Transport_Layer_Security

51 4.6_Examining_Digital_Certificates

52 Module_introduction

53 Learning_objectives

54 5.1_Describing_Endpoint-based_Attacks

55 5.2_Understanding_Data_Normalization

56 5.3_Deconstructing_Universal_Data_Formats

57 5.4_Understanding_the_5-tuple_Correlation

58 5.5_Performing_DNS_Analysis

59 5.6_Performing_Web_Log_Analysis

60 5.7_Performing_Deterministic_and_Probabilistic_Analysis

61 5.8_Understanding_Security_Monitoring_Fundamentals

 

 

PART-03

 

62 5.9_Surveying_Security_Monitoring_Tools

63 5.10_Grasping_Security_Monitoring_Operational_Challenges

64 Learning_objectives

65 6.1_Introducing_NetFlow

66 6.2_Understanding_NetFlow_for_Cyber_Security_and_Incident_Response

67 6.3_Examining_NetFlow_Analysis_Tools

68 6.4_Introducing_IPFIX

69 Learning_objectives

70 7.1_Identifying_and_Mitigating_Reconnaissance

71 7.2_Identifying_and_Mitigating_Weaponization

72 7.3_Identifying_and_Mitigating_Delivery

73 7.4_Identifying_and_Mitigating_Exploitation

74 7.5_Identifying_and_Mitigating_Installation

75 7.6_Identifying_and_Mitigating_Command_and_Control

76 7.7_Understanding_Action_on_Objectives

77 7.8_Understanding_the_MITRE_ATT_CK_Framework

78 Module_introduction

79 Learning_objectives

80 8.1_Examining_Types_of_Evidence

81 8.2_Understanding_Chain_of_Custody

82 8.3_Understanding_Evidence_Collection

83 8.4_Handling_Evidence

 

 

 

PART-04

 

84 8.5_Examining_Asset_and_Threat_Actor_Attribution

85 Learning_objectives

86 9.1_Understanding_Windows_Forensics_Basics

87 9.2_Surveying_Windows_Forensics_-_Application_Processes

88 9.3_Surveying_Windows_Forensics_-_Memory

89 9.4_Surveying_Windows_Forensics_-_The_Windows_Registry

90 9.5_Surveying_Windows_Forensics_-_Hard_Drives_FAT_and_NTFS

91 9.6_Understanding_Linux_and_MAC_OS_X_Forensics_Basics

92 9.7_Examining_Web_Server_Logs

93 Learning_objectives

94 10.1_Examining_Host-based_Intrusion_Detection

95 10.2_Exploring_Antimalware_and_Antivirus

96 10.3_Understanding_Host-based_Firewalls

97 10.4_Exploring_Application-level_AllowLists_BlockLists

98 10.5_Exploring_Systems-based_Sandboxing

99 Module_introduction

100 Learning_objectives

101 11.1_Introducing_Intrusion_Analysis_Fundamentals

102 11.2_Examining_Packet_Captures

103 11.3_Examining_Protocol_Headers

104 11.4_Analyzing_Security_Device_Data

105 11.5_Differentiating_False_Positives_False_Negatives_True_Positives_and_True_Negatives

106 11.6_Comparing_Inline_Traffic_Interrogation_and_Taps_or_Traffic_Monitoring

107 11.7_Extracting_Files_from_a_TCP_Stream_When_Given_a_PCAP_File_and_Wireshark

108 11.8_Interpreting_Common_Artifact_Elements_from_an_Event_to_Identify_an_

 

 

 

PART-05

 

109 Module_introduction

110 Learning_objectives

111 12.1_Understanding_Asset_Management

112 12.2_Understanding_Configuration_Management

113 12.3_Understanding_Mobile_Device_Management

114 12.4_Understanding_Patch_Management

115 12.5_Understanding_Vulnerability_Management

116 12.6_Introducing_PII_and_PHI

117 12.7_Describing_the_Relationship_of_SOC_Metrics_to_Scope_Analysis

118 Learning_objectives

119 13.1_Describing_Concepts_as_Documented_in_NIST.SP800-86

120 13.2_Mapping_the_Organization_Stakeholders_Against_the_NIST_IR_Categories

121 13.3_Scoping_the_Incident_Response_Plan_and_Process

122 13.4_Understanding_Information_Sharing_and_Coordination

123 13.5_Identifying_the_Incident_Response_Team_Structure

124 13.6_Analyzing_Computer_Incident_Response_Teams_CSIRTs

 

Bonus course : 

 

 

Cisco Certified CyberOps Associate CBROPS-200-201

 

Cisco CyberOps- Analyzing the Network

 

Cisco CyberOps- Exploring Security Concepts

 

Cisco CyberOps- Managing Policies and Procedures

 

Cisco CyberOps- Security Monitoring

 

 

CISCO CYBEROPS ASSOCIATE CBROPS 200-201 Video Training Course & PDF Guides DOWNL

SKU: EXT2021-0080
$12.00Price
  • You can Instant Download a PDF file 

    After successful payment , 

    This PDF File Contains Course Download links

    You can Download This Course immediately from click that Links.

bottom of page