Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Learn the basics of cybersecurity, network security and incident response, and prepare for the Cisco Certified Cybersecurity Associate exam. Referentienummer: CBROPS Leverancier: Train It Now Datum * Planning 18 - 22 mei, 2026 - Nieuwegein 18 - 22 mei, 2026 - Virtueel 05 - 9 juli, 2026 - Eindhoven 05 - 9 juli, 2026 - Virtueel 10 - 14 augustus, 2026 - Groningen 10 - 14 augustus, 2026 - Virtueel 22 - 26 november, 2026 - Virtueel 22 - 26 november, 2026 - Amsterdam €2995,00 Aantal: Inschrijven Custom wishlist Ok Toevoegen aan verlanglijst Email een vriend InhoudDefining the Security Operations CenterUnderstanding Network Infrastructure and Network Security Monitoring ToolsExploring Data Type CategoriesUnderstanding Basic Cryptography ConceptsUnderstanding Common TCP/IP AttacksUnderstanding Endpoint Security TechnologiesUnderstanding Incident Analysis in a Threat-Centric SOCIdentifying Resources for Hunting Cyber ThreatsUnderstanding Event Correlation and NormalizationIdentifying Common Attack VectorsIdentifying Malicious ActivityIdentifying Patterns of Suspicious BehaviorConducting Security Incident InvestigationsUsing a Playbook Model to Organize Security MonitoringUnderstanding SOC MetricsUnderstanding SOC Workflow and AutomationDescribing Incident ResponseUnderstanding the Use of VERISUnderstanding Windows Operating System BasicsUnderstanding Linux Operating System BasicsLabsConfigure the Initial Collaboration Lab EnvironmentUse NSM Tools to Analyze Data CategoriesExplore Cryptographic TechnologiesExplore TCP/IP AttacksExplore Endpoint SecurityInvestigate Hacker MethodologyHunt Malicious TrafficCorrelate Event Logs, PCAPs, and Alerts of an AttackInvestigate Browser-Based AttacksAnalyze Suspicious DNS ActivityExplore Security Data for AnalysisInvestigate Suspicious Activity Using Security OnionInvestigate Advanced Persistent ThreatsExplore SOC PlaybooksExplore the Windows Operating SystemExplore the Linux Operating System Algemeen Blokmaat advies Bijlage InhoudDefining the Security Operations CenterUnderstanding Network Infrastructure and Network Security Monitoring ToolsExploring Data Type CategoriesUnderstanding Basic Cryptography ConceptsUnderstanding Common TCP/IP AttacksUnderstanding Endpoint Security TechnologiesUnderstanding Incident Analysis in a Threat-Centric SOCIdentifying Resources for Hunting Cyber ThreatsUnderstanding Event Correlation and NormalizationIdentifying Common Attack VectorsIdentifying Malicious ActivityIdentifying Patterns of Suspicious BehaviorConducting Security Incident InvestigationsUsing a Playbook Model to Organize Security MonitoringUnderstanding SOC MetricsUnderstanding SOC Workflow and AutomationDescribing Incident ResponseUnderstanding the Use of VERISUnderstanding Windows Operating System BasicsUnderstanding Linux Operating System BasicsLabsConfigure the Initial Collaboration Lab EnvironmentUse NSM Tools to Analyze Data CategoriesExplore Cryptographic TechnologiesExplore TCP/IP AttacksExplore Endpoint SecurityInvestigate Hacker MethodologyHunt Malicious TrafficCorrelate Event Logs, PCAPs, and Alerts of an AttackInvestigate Browser-Based AttacksAnalyze Suspicious DNS ActivityExplore Security Data for AnalysisInvestigate Suspicious Activity Using Security OnionInvestigate Advanced Persistent ThreatsExplore SOC PlaybooksExplore the Windows Operating SystemExplore the Linux Operating System