fbpx
+2348145213923, +2347015323811 info@voisiptelecomms.com

CCNA Cybersecurity Operations (CYBEROPS)

 CCNA CYBERSECURITY OPERATIONS (CYBEROPS)

cybernew1

Demand for CyberSecurity Professionals

Cybersecurity operations jobs play a key part of securing information systems through the monitoring, detecting, investigating, analyzing, and responding to security events, thus protecting systems from cybersecurity risks, threats, and vulnerabilities.

CyberSecurity Careers

Today, emboldened cybercriminals are tapping into legitimate
online resources. They leach server capacity, steal data, and
demand ransoms from online victims whose information they hold
hostage. The explosive growth in Internet traffic-driven
largely by faster mobile speeds and the proliferation of online
devices- works in their favor by helping to expand the attack
surface. Facing mounting challenges from cybercrime,
cyberespionage, insider threats, and advanced persistent threats,
organizations are establishing SOC teams of security
professionals who can monitor, detect, and respond rapidly to
security incidents before they cause damage.

The CCNA Cybersecurity Operations curriculum provides a first step in acquiring the knowledge and skills needed to work with a SOC team, and can be a valuable part of beginning a career in the exciting and growing field of cybersecurity operations.

The curriculum helps prepare students for entry-level cybersecurity career opportunities and is aligned to the Understanding Cisco Cybersecurity Fundamentals exam (210-250 SECFND) and Implementing Cisco Cybersecurity Operations exam (210-255 SECOPS) leading to the Cisco CCNA Cybersecurity Operations certification.

COURSE OUTLINE
  • Explain the role of the Cybersecurity Operations Analyst in the enterprise.
  • Explain why networks and data are attacked.
  • Explain how to prepare for a career in Cybersecurity operations.
  • Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
  • Explain the operation of the Windows Operating System.
  • Explain how to secure Windows endpoints.
  • Explain the features and characteristics of the Linux Operating
    System.
  • Perform basic operations in the Linux shell.
  • Perform basic Linux Administration tasks.
  • Analyze the operation of network protocols and services.
  • Explain how the Ethernet and IP protocols support network
    communications and operations
  • Explain how network services enable network functionality.
  • Explain network topologies and the operation of the network
    infrastructure.
  • Explain how network devices enable wired and wireless
    network communication.
  • Explain how devices and services are used to enhance
    network security.
  • Classify the various types of network attacks.
  • Explain how networks are attacked.
  • Explain the various types of threats and attacks.
  •  
  • Use various methods to prevent malicious access to computer
    networks, hosts, and data.
  • Explain approaches to network security defense.
  • Use various intelligence sources to locate current security
    threats.
  • Use various methods to prevent malicious access to computer
    networks, hosts, and data.
  • Explain approaches to network security defense.
  • Use various intelligence sources to locate current security
    threats.
  • Explain the impacts of cryptography on network security
    monitoring.
  • Use tools to encrypt and decrypt data.
  • Explain how the public key infrastructure (PKI) supports
    network security.
  • Explain endpoint vulnerabilities and attacks investigation
    process.
  • Use tools to generate a malware analysis report.
  • Classify endpoint vulnerability assessment information.
  • Evaluate network security alerts.
  • Explain how security technologies affect security monitoring.
  • Explain the types of log files used in security monitoring.
  • Analyze network intrusion data to identify compromised hosts
    and vulnerabilities
  • Explain how security-related data is collected.
  • Analyze intrusion data to determine the source of an attack.
  • Msfconsole overview
  • Msfconsole commands
  • Exploits
  • Payloads
  • Generating payloads

wtc course registration

type your first and last name
🇳🇬
  • Select course here
  • Certified Ethical Hacking (CEH)
  • Networking Essentials
  • CCNA
  • Introduction to Cybersecurity
  • Cybersecurity Essentials
  • CCNA Cybersecurity Operations
  • Cisco Academy IT Essentials
  • Cisco Academy NGL Linux Essentials
  • Web Design
  • Web Development
  • WordPress Content Management System
  • Voisip Voice and Video Telephony Training
  • Microsoft Server
Select your course of interest
choose your batch

Pin It on Pinterest