(CBRCOR) Performing CyberOps Using Cisco Security Technologies
Advance your cybersecurity skills with CBRCOR training. Gain expertise in automation, incident response, and threat analysis for effective SOC performance.
Duration
5 days
Version
1.0
CE Credits
40
The Cisco Continuing Education Program enables you to renew your certifications while exploring new learning paths and enhancing your skillset. It's a convenient way to stay certified without retaking exams. Click here to learn more.
CLCs
40
Cisco Learning Credits (CLCs) are prepaid training vouchers that can be used as investment into your knowledge. You can attend NIL Learning’s trainings and pay with CLCs. Click here to learn more.
By default, our instructors deliver the courses remotely in real time in English. On-premise delivery and other languages available on request.
Course Overview
The Performing CyberOps Using Cisco Security Technologies (CBRCOR) is an instructor-led or virtual instructor-led course that guides you through cybersecurity operations fundamentals, methods, and automation. The knowledge you gain in this course will prepare you for the role of Information Security Analyst on a Security Operations Center (SOC) team.
You will learn foundational concepts and their application in real-world scenarios, and how to leverage playbooks in formulating an Incident Response (IR). The course teaches you how to use automation for security using cloud platforms and a SecDevOps methodology. You will learn the techniques for detecting cyberattacks, analyzing threats, and making appropriate recommendations to improve cybersecurity.
This course will help you:
- Gain an advanced understanding of the tasks involved for senior-level roles in a security operations center
- Configure common tools and platforms used by security operation teams via practical application
- Prepare you to respond like a hacker in real-life attack scenarios and submit recommendations to senior management
Welcome to Your Path to Mastery!
Hey! Ready to learn and grow? I'm here to help you every step of the way!
Welcome aboard! This course is tailored to empower you with the knowledge and skills you need. We'll make learning engaging and fun, turning your challenges into achievements. Let's get started on your amazing journey!
Robert Lesar
Lead Instructor
Dates and Prices
Date | Language | Location | Price| | |
---|---|---|---|---|
24.02.2025 - 28.02.2025 |
English |
Online, GMT+1 |
2880 € 2910 $ or 40 CLC |
Book now |
All prices exclude VAT. |
All prices exclude VAT.
Cisco Learning Credits (CLCs) are prepaid training vouchers that can be used as investment into your knowledge. You can attend NIL Learning’s trainings and pay with CLCs. Click to learn more.
Objectives
Gain expert IT skills with NIL Learning: Benefit from our blend of theory and practical experience. Enhance your growth with insights into current and future tech trends. Choose us for cutting-edge Cisco training and more, taught by field-proven experts to maximize your training investment.
- Describe the types of service coverage within a SOC and operational responsibilities associated with each
- Compare security operations considerations of cloud platforms
- Describe the general methodologies of SOC platforms development, management, and automation
- Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections
- Describe Zero Trust and associated approaches, as part of asset controls and protections.
- Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC
- Use different types of core security technology platforms for security monitoring, investigation, and response
- Describe the DevOps and SecDevOps processes
- Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, Comma-Separated Values (CSV)
- Describe API authentication mechanisms
- Analyze the approach and strategies of threat detection, during monitoring, investigation, and response
- Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs)
- Interpret the sequence of events during an attack based on analysis of traffic patterns
- Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools)
- Analyze anomalous user and entity behavior (UEBA)
- Perform proactive threat hunting following best practices
Who should enroll?
Although there are no mandatory prerequisites, the course is particularly suited for the following audiences:
- Cybersecurity engineer
- Cybersecurity investigator
- Incident manager
- Incident responder
- Network engineer
- SOC analysts currently functioning at entry level with a minimum of 1 year of experience
Course benefits:
Get expert knowledge
Our learning programs are designed and led by expert IT engineers, consultants, and instructors. We constantly implement participants’ feedback to improve courses.
Our experiences build your competencies
With 30+ years of experience, we’ve been on the market as long as Cisco. Our understanding of IT systems and industry job demands gives us the insight to guide you toward becoming a world-class expert yourself.
Rise above the industry average
Cisco courses are intended not only for passing the certification exam but also for developing your skills and rising above the industry average. Our instructors provide guidance and references that allow you to grow into a confident and competent professional.
Retain the knowledge longer
Our in-depth, non-interrupted learning program ensures you understand the bigger picture and retain the knowledge long term. It also reduces the risk of information loss and confusion.
Learn from the best in Cisco technologies
Our IT consultants-turned-instructors have years of experience and dedicate time to listening and interacting with participants within the course content. Their hands-on project involvement brings practical expertise to our learning programs.
Have peace of mind
We deliver on our promise and schedule. Rest assured, our instructors will give you knowledge, information, hints, and practical experiences around specific topics. Based on a global survey conducted by Cisco, NIL Learning instructors enjoy an average score of 4.78 out of 5.
Be ahead of the curve
As Cisco Platinum Learning Partner and technical community member, we create learning content for major technological vendors. NIL Learning is among the first to offer high-quality learning and training courses in Cisco Technologies.
Get more from a training
Our instructors deliver the courses with practical and useful examples from real-life situations. All NIL Learning instructors are field-proven experts – each both an active engineer and instructor.
Courses delivered by experts for experts in the making.
Among the first to offer training on newly arrived Cisco technologies
Part of Conscia, leading European IT solutions and services provider
A tech powerhouse with 30+ years of training & field experience
Industry-acclaimed, broadly expertised, and technically proficient
Connecting you with future trusted industry advisors
Course Outline
- Understanding Risk Management and SOC Operations
- Understanding Analytical Processes and Playbooks
- Investigating Packet Captures, Logs, and Traffic Analysis
- Investigating Endpoint and Appliance Logs
- Understanding Cloud Service Model Security Responsibilities
- Understanding Enterprise Environment Assets
- Implementing Threat Tuning
- Threat Research and Threat Intelligence Practices
- Understanding APIs
- Understanding SOC Development and Deployment Models
- Performing Security Analytics and Reports in a SOC
- Malware Forensics Basics
- Threat Hunting Basics
- Performing Incident Investigation and Response
Lab Outline
- Explore Cisco SecureX Orchestration
- Explore Splunk Phantom Playbooks
- Examine Cisco Firepower Packet Captures and PCAP Analysis
- Validate an Attack and Determine the Incident Response
- Submit a Malicious File to Cisco Threat Grid for Analysis
- Endpoint-Based Attack Scenario Referencing MITRE ATTACK
- Evaluate Assets in a Typical Enterprise Environment
- Explore Cisco Firepower NGFW Access Control Policy and Snort Rules
- Investigate IOCs from Cisco Talos Blog Using Cisco SecureX
- Explore the ThreatConnect Threat Intelligence Platform
- Track the TTPs of a Successful Attack Using a TIP
- Query Cisco Umbrella Using Postman API Client
- Fix a Python API Script
- Create Bash Basic Scripts
- Reverse Engineer Malware
- Perform Threat Hunting
- Conduct an Incident Response
Prerequisite Knowledge
Although there are no mandatory prerequisites, to fully benefit from this course, you should have the following knowledge:
- Familiarity with UNIX/Linux shells (bash, csh) and shell commands
- Familiarity with the Splunk search and navigation functions
- Basic understanding of scripting using one or more of Python, JavaScript, PHP or similar.
Recommended Cisco offerings that may help you prepare for this course:
Why NIL?
Global Leading Provider of Cisco Courses
30+ years of experience
Since 1992, NIL has been at the forefront of advanced contributors to strategic partner Cisco technologies, learning curriculum and value-added solutions deployed to clients around the globe.
Learn more about us