Mode of Instruction Instructor-Led
Learning Hours 70
Career Path Security Operations Center (SOC) Analyst, Cybersecurity Analyst, Network Security, Incident Response
Level Intermediate
Fee On Request
Who Should Attend

Aspiring SOC Analysts, IT professionals with cybersecurity interest, and those aiming for Cisco CyberOps Associate certification.

Course Overview

Welcome to the thrilling world of cybersecurity, where you can combat cybercrime, outsmart cyber espionage, and tackle a wide range of networking threats. Cybersecurity is one of the fastest-growing fields, and this course equips you with the in-demand skills needed to join a Security Operations Center (SOC) team.

Prepare for the Cisco Certified Cybersecurity Associate (CCCA) Certification and gain essential skills for SOC Analyst job roles across industries. You will learn how SOC teams detect and respond to security incidents, explore security concepts, monitoring, host-based analysis, network intrusion analysis, and security policy procedures.

This course aligns with the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce framework to support consistent language for cybersecurity education, training, and workforce development.

Course Outline:
  • Module 1: The Danger
  • Module 2: Fighters in the War Against Cybercrime
  • Module 3: The Windows Operating System
  • Module 4: Linux Overview
  • Module 5: Network Protocols
  • Module 6: Ethernet and Internet Protocol (IP)
  • Module 7: Connectivity Verification
  • Module 8: Address Resolution Protocol
  • Module 9: The Transport Layer
  • Module 10: Network Services
  • Module 11: Network Communication Devices
  • Module 12: Network Security Infrastructure
  • Module 13: Attackers and Their Tools
  • Module 14: Common Threats and Attacks
  • Module 15: Network Monitoring and Tools
  • Module 16: Attacking the Foundation
  • Module 17: Attacking What We Do
  • Module 18: Understanding Defense
  • Module 19: Access Control
  • Module 20: Threat Intelligence
  • Module 21: Cryptography
  • Module 22: Endpoint Protection
  • Module 23: Endpoint Vulnerability Assessment
  • Module 24: Technologies and Protocols
  • Module 25: Network Security Data
  • Module 26: Evaluating Alerts
  • Module 27: Working with Network Security Data
  • Module 28: Digital Forensics and Incident Analysis and Response