CCNA Cyber Ops SECOPS 210-255 Complete Video Course and Practice Test
- By Omar Santos
- Published May 31, 2017 by Pearson IT Certification. Part of the LiveLessons series.
Premium Edition Video
- Your Price: $159.99
- List Price: $199.99
- About this video
- Link to download the enhanced Pearson IT Certification Practice Test exam engine
- Access code for question database
- Access to the streaming video through your Account page after purchase
The Premium Edition Video is a digital-only certification preparation product combining a video course with enhanced Pearson IT Certification Practice Tests.
Your purchase will deliver:
- Copyright 2017
- Edition: 1st
- Premium Edition Video
- ISBN-10: 0-13-466109-5
- ISBN-13: 978-0-13-466109-4
4+ Hours of Video Instruction
Overview
More than four and a half hours of video instruction on configuration and troubleshooting tasks to prepare you for the Cisco CCNA Cyber Ops SECOPS 210-255 certification exam.
Description
CCNA Cyber Ops SECOPS 210-255 Complete Video Course is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-255 SECOPS exam. This product walks through each topic of the Implementing Cisco Cybersecurity Operations exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as a Security Operations Center (SOC) security analyst.
CCNA Cyber Ops SECOPS 210-255 Complete Video Course contains more than four and a half hours of instruction with 11 lessons. The videos consist of live video training, video screencasts, and demos. Video instruction throughout offers detailed explanations, tips, and design recommendations.
Major topics include
* Endpoint Threat Analysis and Computer Forensics
* Network Intrusion Analysis
* Incident Response
* Data and Event Analysis
* Incident Handling
* Lesson quizzes to help you test yourself on concepts and commands
* Interactive exercises so you can put your knowledge to the test
* A full practice exam delivered in the Pearson Test Prep Engine
Skill Level
Beginning to intermediate
What You Will Learn
* Real-world solutions for understand the Cisco threat analysis and incident response solution
* All the objectives in the CCNA Cyber Ops exam
* Easy-to-follow demonstrations of cybersecurity tools, products, and solutions
* Scenarios offered to help learners understand real-world applications
Who Should Take This Course
Anyone who wants to obtain their CCNA Cyber Ops certification. This includes security professionals interested in learning how to develop, manage, or improve a security operations center, a CSIRT, a PSIRT, or anyone who wants to become a cybersecurity incident response expert. Anyone wishing to take the CCNA CyberOps exam would also benefit from viewing this course.
Course Requirements
The video course assumes that the learner has the skills to navigate the user interface of a PC running Windows, Mac, or Linux and who has completed typical high school-level math courses (mainly that the reader has been exposed to binary math). The course also assumes that the reader has used PCs connected to either a home network or a network inside a school or company, but that the reader might not understand anything about the network to which the PC was connected. It also assumes that the reader knows how to use typical Internet applications, primarily web browsers and email clients.
About LiveLessons Video Training
LiveLessons Video Training series publishes hundreds of hands-on, expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. This professional and personal technology video series features world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, IBM Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT Certification, Programming, Web Development, Mobile Development, Home and Office Technologies, Business and Management, and more. View all LiveLessons on InformIT at http://www.ciscopress.com/livelessons.
Table of Contents
Lesson 1: Threat Analysis
1.1: Understanding Risk Analysis
1.2: Understanding the Common Vulnerability Scoring System (CVSS)
1.3: Interpreting Malware Analysis Tool Output
Lesson 2: Forensics
2.1: Examining Types of Evidence
2.2: Surveying Windows Forensics: Application Processes, Threads, and Vulnerabilities
2.3: Surveying Windows Forensics: Memory
2.4: Surveying Windows Forensics: The Windows Registry
2.5: Surveying Windows Forensics: Hard Drives, FAT, and NTFS
2.6: Surveying Linux Forensics
2.7: Understanding Evidence Collection
2.8: Handling Evidence
2.9: Examining Asset and Threat Actor Attribution
Lesson 3: Intrusion Analysis
3.1: Introducing Intrusion Analysis Fundamentals
3.2: Examining Packet Captures
3.3: Examining Protocol Headers
3.4: Analyzing Security Device Data
3.5: Differentiating False Positives, False Negatives, True Positives, and True Negatives
Lesson 4: NetFlow for Cyber Security
4.1: Introducing NetFlow
4.2: Comparing NetFlow Versions
4.3: Understanding NetFlow for Cyber Security and Incident Response
4.4: Examining NetFlow Analysis Tools
4.5: Introducing IPFIX
Lesson 5: Introduction to Incident Response
5.1: Scoping the Incident Response Plan and Process
5.2: Understanding Information Sharing and Coordination
5.3: Identifying the Incident Response Team Structure
Lesson 6: Incident Response Teams
6.1: Analyzing Computer Incident Response Teams (CSIRTs)
6.2: Analyzing Product Security Incident Response Teams (PSIRTs)
6.3: Surveying Coordination Centers
6.4: Analyzing Managed Security Service Providers Incident Response Teams
Lesson 7: Compliance Frameworks
7.1: Considering PCI-DSS
7.2: Considering HIPAA
7.3: Considering SOX
Lesson 8: Network and Host Profiling
8.1: Understanding Network Profiling
8.2: Understanding Host Profiling
Lesson 9: Data and Event Analysis
9.1: Understanding Data Normalization
9.2: Deconstructing Universal Data Formats
9.3: Understanding the 5-tuple Correlation
9.4: Performing DNS Analysis
9.5: Performing Web Log Analysis
9.6: Performing Deterministic and Probabilistic Analysis
Lesson 10: Intrusion Event Categories
10.1: Identifying and Mitigating Reconnaissance
10.2: Identifying and Mitigating Weaponization
10.3: Identifying and Mitigating Delivery
10.4: Identifying and Mitigating Exploitation
10.5: Identifying and Mitigating Installation
10.6: Identifying and Mitigating Command and Control
10.7: Understanding Action on Objectives
Lesson 11: The Incident Handling Process
11.1: Introducing the Vocabulary for Event Recording and Incident Sharing (VERIS)
11.2: Applying the VERIS Schema to Incident Handling
11.3: Surveying the VERIS Incident Recording Tool and Other VERIS Resources
Other Things You Might Like
- Securing Enterprise Networks with Cisco Meraki
- eBook $55.99
- Securing Enterprise Networks with Cisco Meraki
- Book $55.99