AITAC�����Cybersecurity Operations
2© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
Introduction to Cybersecurity Cybersecurity
EssentialsCCNA Cybersecurity
Operations
AITAC����� �Cisco���������
��� ���� ����������
�� �� ����
STEP1e-learning
����
3© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
CCNA Cybersecurity Operations�,.Cyber Ops:��Security Operation Center, SOC, :��9�/17?��724.�*SLR:GCPQHA @JQFI?-�2=3
(950>FCR
• � :GCPQHAEFHN:�&#�• DBKT��:��#�• DBKT�+:$<:��#�
• �'78>!"
• ���8���%?��. �;���%:FMEOQFI726.GCPQHA?�*�)73>!"
4© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
��5��4�!3FAU
��57��6�!3FAU(��,;:
• PC<��%>XHYLIK2��<�$2):��
• ���4%Windows3LinuxEFJQ6DXGNK<��
• ���4LIKWYAXC6DXGNK<��
• 2#�316#�6��
• ���4NVCSPXC6DXGNK<��
• ���4SQLB?T6��
• Cisco Packet Tracer6��
�:��6Cisco Networking Academy6DYF< .:+32%CCNA Cyber Operations6 �5��4�!3FAU<"50*:+3(2)8.:
IT & OS• IT Essentials• NDG Linux Essentials
Networking• Networking Essentials• CCNA R&S: Introduction to Networks
Security• Introduction to Cybersecurity• Cybersecurity Essentials
Packet Tracer• Introduction to Packet Tracer
Essentials of:• Programming
• Electricity• Networking
CCNA Cyber Ops27%��6�!3FAU6/96���OJT=U(% @NERX3-1��MVY6�58;'8.&
5© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
+N.���
� 0$6I 4NA ���������
1 ,$;N/(EH4#�Security Operations Center $M6K1)-FM
2 Windows&?JN4#M* -.4BOS��� ITE�Linux Essentials���
3 Linux&?JN4#M* -.4B
4 :36LN) >K6+I�,N<.:36LN(M*��� CCNA R&S (ITN) ���
5 :36LN) $M=G.6G)2D
6 :36LN) /(EH4#���
,$;N/(EH4#���Cybersecurity Essentials�CCNA
Security���
7 :36LN) "03).: �!�
8 :36LN)!�
9 ���������
10 %M7@$M6 /(EH4#�"8H-.
11 /(EH4# C90HM*
,$;N/(EH4#�&?JN-FM
12 Intrusion Data Analysis
13 $M-5M6����H';H
6© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
CCNA Cybersecurity Operations 1.0��������
7© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
� ����� ������
1 SL^mVOegZK<Security Operations Center
SL^m� @%1*�J*��J�#6H+SL^m� A*8@��J�6 1�>IB*��J�6��F�>H3<G*Security Operations Centers, SOC, ASL^m��<�.��;,H3<J�D+
2 WindowsNbimZKlQTUZd ���>Windows@RlVa[<*OS1=@�?�!5:-H0J�C*WindowsMl\cLl[J�&6H9E?��4IHYmhJ�H+
3 LinuxNbimZKlQTUZd Linux?/2H�� *�CVOegZK?)(59WUPJ�C*Linux@���>NbimTflJ"6H+
4 ]X[kmPaj[Rh<Sm_UTCP/IPaj[RhJ��59]X[kmP1'=@�>��J5*Rl`emW]X[kmPU�@WUPJ"47H)(59Sm_UJ$�6H+
CCNA Cyber Ops Course Outline
8© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
CCNA Cyber Ops Course Outline
� ����� ������
5 ]UYnpIEo`iPYiITenECpZ(nEflP(]UYnpIQHgjWD(]UYnpIXMEoB�<(]UYnpIEo`iPYiITe;��GblpNhoB$�1@)
6 ]UYnpIQHgjWD;��]UYnpIB��0=,71@�� ->(]UYnpIB@3<;�*9VpkB��(2;��B��1@)
7 ]UYnpICSUIP: ��?B1@Yi`DUI d\SjoJ;%"�B�#0(8;�:d\SjoJ.�/A@-B�#1@)]UYnpIamYKk;!��(IP, TCP, UDP, ARP, DNS, DHCP, HTTP, &�cpk7+43Lp_P;!��B�')
8 ]UYnpIB@]UYnpIQHgjWDB��1@3<;CampT(CIQPKoYmpk; �B$�(LE^pQHgjWD C[jPY.PlUYEoWjOFoP;3<:��1@�*9jRpP:5+6��1@)
9© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
CCNA Cyber Ops Course Outline� ����� ������
9 ��9�('�WPSehJNI^aQD<]VOafK;-0?��<&!�A#�3?+
10 FfT\EfS NI^aQD9CUaLM FfT\EfS<���9��A$�3?��A#�3?+
11 NI^aQD ]VOafKNI^aQD� 9NI^aQD]VOafK;��1@5dKZBEb;7,8#�3?+
12 Intrusion Data Analysis WPSehJNI^aQD C`hS/FgDRfM928*:<�;c\hS*"�*��*FMGchL_f*�%1@?<.A�3?+
13 EfLRfS� 94<aGYa
Cyber Kill Chain, Diamond Model, VERIS Schema, Computer Security Incident Response Teams (CSIRTs) <��>9EfLRfS� <[dNM;�05National Institute of Standards and Technologies (NIST)<HET`Ef9,65*EfLRfS� XfTafK]Rb9�)A=+
10© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
1E4&�(��)• ,D4;A/7%()70��F�G&��$��
• ���1E4',D4;A/7%()22.5��&���#"!
• 2,>E6.@B:+&��*>E8?C��#3<B-�
• ���=9.D0 6.@B:+�� � ��*��
• =D5-D��
• Packet Tracer
11© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
���� 3�� 90� x 154J
� 9-?R =WJ
1 5-DW81NQ=, Security Operations Center -V?T:26OV
2 Windows/HSW=,V3 67=KOS!��
3 Linux/HSW=,V3 67=K
4 C<?UW2 GT?4R 5WE7C<?UW1V3!��
5 C<?UW2 -VFP7?P2;M
6 C<?UW2 81NQ=,!��
5-DW81NQ=,!��
7 C<?UW2 +9<27: ��&)�'
8 C<?UW2)�'
9 �� ����
10 .V@I-V? 81NQ=, +AQ67
11 81NQ=, LB9QV3
5-DW81NQ=,!/HSW6OV12 Intrusion Data Analysis
13 -V6>V?� �!Q0DQ
����!�% 2��5��#9�"��$($�*
12© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
09.;4HJ?0��10.;4HJ?0�� M6��11.��@P<(��12.C>ANP5.�-,@P<(��13.@9<KE3LO9>[email protected]@OADOBJO62
Q� 7P:%(����
90�x 157G%�� 2��5�*9�)"+-+$/
1.1OAM=58IO2.C>ANP5;4HJ?013.C>ANP5;4HJ?024.C>ANP5�(��.��5.C>ANP5�(�#'��6.C>ANP5�(;4HJ?0 �7.2OBF1OA;4HJ?08.!�(��&��
13© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
Timetable1�� 2�� 3��
9:00 9:30 �� �� ��
9:30 11:00 $?2=.(*9? 4/2>@(��,'8:0#�� ��1@-��
11:00 12:30 4/2>@(,'8:0#1 %?37$?2,'8:0# 4/2>@("�! 1@-��
12:30 13:30 Lunch Lunch Lunch
13:30 15:00 4/2>@(,'8:0#2 �������� 1+-;6&<?+/(
15:00 15:30 � � �
15:30 17:00 4/2>@(���"�� ,'8:0#�� $?*1?25?3:?)1
17:00 18:30 4/2>@(������ ,'8:0#��=)� $?*1?25?3:?)A
Top Related