Cisco Securing Cisco Networks with threat Detection and Analysis 1.0 (SCYBER)
Training for your Group
- Private class for your team
- Online or on-location
- Fully customizable course material
- Onsite testing available
Training for Individuals
$3650
- Live, Instructor-led training
- Expert instructors
- Hands-on instruction
Upcoming Dates
Course Overview
This course is designed to teach students how a network security operations center (SOC) works and how to begin to monitor, analyze, and respond to security threats within the network and will help prepare students for the Cisco Cybersecurity Specialist exam (600-199 SCYBER).
Course Length: 5 days
Audience: This course is designed for technical professionals who need to know how to monitor, analyze, and respond to network security threats and attacks.
Prerequisites: Cisco® Interconnecting Cisco® Networking Devices Part 1 v3.0 (ICND1)
What You're Going To Learn
This lab-intensive training course prepares you to take the Cyber Security Specialist Certification exam (exam ID = 600-199) and to hit the ground running as a security analyst team member.
Register for an Upcoming Date
Course Outline
1 – Attacker Methodology
- Defining the Attacker Methodology
- Identifying Malware and Attacker Tools
- Understanding Attacks
2 – Defender Methodology
- Enumerating Threats, Vulnerabilities, and Exploits
- Defining SOC Services
- Defining SOC Procedures
- Defining the Role of a Network Security Analyst
- Identifying a Security Incident
3 – Defender Tools
- Collecting Network Data
- Understanding Correlation and Baselines
- Assessing Sources of Data
- Understanding Events
- Examining User Reports
- Introducing Risk Analysis and Mitigation
4 – Packet Analysis
- Identifying Packet Data
- Analyzing Packets Using Cisco IOS Software
- Accessing Packets in Cisco IOS Software
- Acquiring Network Traces
- Establishing a Packet Baseline
- Analyzing Packet Traces
5 – Network Log Analysis
- Using Log Analysis Protocols and Tools
- Exploring Log Mechanics
- Retrieving Syslog Data
- Retrieving DNS Events and Proxy Logs
- Correlating Log Files
6 – Baseline Network Operations
- Baselining Business Processes
- Mapping the Network Topology
- Managing Network Devices
- Baselining Monitored Networks
- Monitoring Network Health
7 – Incident Response Preparation
- Defining the Role of the SOC
- Establishing Effective Security Controls
- Establishing an Effective Monitoring System
8 – Security Incident Detection
- Correlating Events Manually
- Correlating Events Automatically
- Assessing Incidents
- Classifying Incidents
- Attributing the Incident Source
9 – Investigations
- Scoping the Investigation
- Investigating Through Data Correlation
- Understanding NetFlow
- Investigating Connections Using NetFlow
10 – Mitigations and Best Practices
- Mitigating Incidents
- Using ACLs
- Implementing Network-Layer Mitigations and Best Practices
- Implementing Link-Layer Best Practices
11 – Communication
- Documenting Communication
- Documenting Incident Details
12 – Post-Event Activity
- Conducting an Incident Post-Mortem
- Improving Security of Monitored Networks
What to Expect at LeapFox
Knowledgeable Instructors
Our instructors are certified professionals. They are trained on the latest features and how to get the most out of software programs.
Hands-on Labs
No boring lectures! Our courses are designed to give students lots of time to practice what they are learning with hands-on exercises and projects.
Certificate of Completion
Receive a certificate of completion at the end of every course.
Up-to-date Curriculum
Each course comes with a helpful and up-to-date ebook which will contain instruction and practice exercises.
Time Saving Tips N Tricks
In each course, your instructor will show you tips and tricks that will save you time and make you more efficient.
Friendly and Helpful Staff
Our staff is dedicated to your success. Each team member is trained to provide the absolute best customer service possible.
Satisfaction Guarantee
If you aren't 100% satisfied with your experience at LeapFox, simply let us know, and we will make it right.