NOUVEAU - Préparation à la certification officielle Cisco Certified CyberOps Associate

72 h
792,00 €
Contenu

Le cours est fourni via l'environnement d'apprentissage Cisco NetAcad.com. Plus d'informations https://www.cisco.com/c/dam/en_us/training-events/certifications/shared/docs/cyber-ops-at-a-glance.pdf

 

  • Cybersécurité et centre des opérations de sécurité
  • Système d'exploitation Windows
  • Système d'exploitation Linux
  • Protocoles et services réseaux
  • Infrastructure réseaux
  • Principes de la sécurité des réseaux
  • Attaques de réseaux
  • Protéger les réseaux
  • Cryptographie et infrastructure
  • Sécurité et analyse des terminaux
  • Surveillance de la sécurité
  • Analyse des données d'intrusion
  • Réponse et traitement des incidents

 

Version anglaise détaillée: 

Chapter 1. Cybersecurity and the Security Operations Center

  • Explain the role of the Cybersecurity Operations Analyst in the enterprise.
  • Explain why networks and data are attacked.
  • Explain how to prepare for a career in Cybersecurity operations.

Chapter 2. Windows Operating System

  • Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
  • Explain the operation of the Windows Operating System.
  • Explain how to secure Windows endpoints.

Chapter 3. Linux Operating System

  • Explain the features and characteristics of the Linux Operating
  • System.
  • Perform basic operations in the Linux shell.
  • Perform basic Linux administration tasks.

Chapter 4. Network Protocols and Services

  • Analyze the operation of network protocols and services.
  • Explain how the Ethernet and IP protocols support network communications and operations
  • Explain how network services enable network functionality.

Chapter 5. Network Infrastructure

  • Explain network topologies and the operation of the network infrastructure.
  • Explain how network devices
  • Explain how devices and services are used to enhance network security.

Chapter 6. Principles of Network Security

  • Classify the various types of network attacks.
  • Explain how networks are attacked.
  • Explain the various types of threats and attacks.

Chapter 7. Network Attacks: A Deeper Look

  • Use network monitoring tools to identify attacks against network protocols and services.
  • Explain network traffic monitoring.
  • Explain how TCP/IP vulnerabilities enable network attacks.
  • Explain how common network applications and services are vulnerable to attack.

Chapter 8. Protecting the Network

  • Use various methods to prevent malicious access to computer networks, hosts, and data.
  • Explain approaches to network security defense.
  • Use various intelligence sources to locate current security threats.

Chapter 9. Cryptography and the Public Key Infrastructure

  • Explain the impacts of cryptography on network security monitoring.
  • Use tools to encrypt and decrypt data.
  • Explain how the public key infrastructure (PKI) supports network security

Chapter 10. Endpoint Security and Analysis

  • Explain endpoint vulnerabilities and attacks investigation process.
  • Use tools to generate a malware analysis report.
  • Classify endpoint vulnerability assessment information.

Chapter 11. Security Monitoring

  • Evaluate network security alerts.
  • Explain how security technologies affect security monitoring.
  • Explain the types of log files used in security monitoring.

Chapter 12. Intrusion Data Analysis

  • Analyze network intrusion data to identify compromised hosts and vulnerabilities
  • Explain how security-related data is collected.
  • Analyze intrusion data to determine the source of an attack.

Chapter 13. Incident Response and Handling

  • Explain how network security incidents are handled by CSIRTs.
  • Apply incident response models, such as NIST 800-61r2 to a security incident.
  • Use a set of logs to isolate threat actors and recommend an incident response plan.

© 2018 Cisco and/or its affiliates

Informations pratiques

  • Droit d'inscription

    792,00 €

    Cette formation est agréée "chèques formation".
  • Horaires
    • Site de Liège Château Massart
      • Du 7 octobre 2020 au 10 mars 2021

        De 18h à 22h

  • Certificat - Attestation

    Attestation de participation.

  • Aides sectorielles à la formation

    Pouvez-vous bénéficier d’une aide sectorielle ? Pour en savoir plus, consultez l’onglet Fonds sectoriels de formation

     

  • Reconnaissance

    Le Centre IFAPME Liège-Huy-Verviers est reconnu comme Académie CISCO officielle.

    Plus d'informations sur les académies CISCO sur Netacad.