Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

Cisco CCNA CyberOps

Cybersecurity operations jobs are also among the fastest-growing roles in IT, as organisations set up security operations centres (SOCs), and establish teams to monitor and respond to security incidents. CCNA CyberOps provides a valuable first step in acquiring the knowledge and skills needed to work with a SOC team and can be a valuable part of beginning a career in the exciting and growing field of cybersecurity operations.

Description

Cybersecurity operations jobs play a key part in securing information systems through the monitoring, detecting, investigating, analysing, and responding to security events, thus protecting systems from cybersecurity risks, threats, and vulnerabilities.

Cybersecurity operations jobs are also among the fastest-growing roles in IT, as organisations set up security operations centres (SOCs), and establish teams to monitor and respond to security incidents.

CCNA CyberOps provides a valuable first step in acquiring the knowledge and skills needed to work with a SOC team and can be a valuable part of beginning a career in the exciting and growing field of cybersecurity operations.

 

The CCNA CyberOps course prepares students for the following:

  • Explain the role of Cybersecurity Operations Analyst

  • Learn Operating Systems features needed to support cybersecurity analyses

  • Explain the operation of network infrastructure and classify the various network attacks

  • Analyse the operation of network protocols and services, and use monitoring tools to identify attacks.

  • Use various methods to prevent malicious access to computer hosts and data

  • Explain the impacts of cryptography on network security monitoring

  • Explain how to investigate and evaluate endpoint vulnerabilities and network security alerts

  • Use virtual machines to implement, evaluate, and analyse cybersecurity threat events

  • Analyse network intrusion data to identify compromised hosts and vulnerabilities

  • Apply incident response model (CSIRSTs and NIST) to manage security incidents

 

Certification exams need to be booked and paid for separately via a Pearson Vue testing centre.

Visit the UWS online store to book a space on any of our scheduled CCNA CyberOps courses.

CCNA CyberOps courses are eligible for ITA funding - visit the Skills Development Scotland website to check your eligibility and to search for courses.

Prerequisites

Basic Operating System (Windows, Linux) and networking concepts.
Binary and Hexadecimal understanding.
Awareness of basic programming concepts.
Awareness of basic SQL queries.
IT Essentials, CCENT or equivalent knowledge recommended.

Audience

Anyone interested in a career in the rapidly growing area of cybersecurity operations working in or with a security operations centre (SOC) in entry-level job roles such as Security SOC Analyst or Incident Responder. The course introduces the core security concepts and skills needed to monitor, detect, analyse and respond to cybercrime, cyberespionage, insider threats, advanced persistent threats, regulatory requirements, and other cybersecurity issues.

What you will learn

  • Module 1: Security Operations centre, threat actors, threat impact

  • Module 2: Windows Operating system, configuration, security and Monitoring

  • Module 3: Linux Operating system, Linux shell, file system, administration

  • Module 4: Network Protocols and Services, Ethernet, IP, ARP, Transport layer 

  • Module 5: Network Infrastructure, wireless, security devices, physical and logical topologies

  • Module 6: Principles of Network Security, attackers and their tools, common threats and attacks

  • Module 7: Network monitoring and tools, IP, TCP and UDP vulnerabilities, attacking services

  • Module 8: Defence-in-depth, security policies, access control, threat intelligence

  • Module 9: Cryptography and the Public Key Infrastructure, encryption, digital signatures, certificates

  • Module 10: Endpoint Security and Analysis, Host based IPS, CVSS, compliance frameworks, NIST

  • Module 11: Security Monitoring, technologies and protocols, security data and log files

  • Module 12: Intrusion Data Analysis, evaluating alerts, digital forensics

  • Module 13: Incident Response and Handling, Cyber Kill Chain, Diamond model, VERIS, CSIRTs

Press enter to see more results