Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cisco CyberOps Associate CBROPS 200-201
Cisco CyberOps Associate CBROPS 200-201
Introduction (1:16)
Kali Install (8:36)
Network Concepts
Network Fundamentals (9:42)
Network Protocols - ICMP (2:55)
Network Protocols - DHCP (4:01)
Network Protocols - DNS (2:56)
Network Devices (4:48)
Firewalls (2:49)
IPS & AMP (8:38)
Email & Web Security (1:18)
Inline Traffic Interrogation, Taps & NetFlow (1:46)
Security Concepts
CIA Triad (0:59)
Defense in Depth Strategy (0:57)
Vulnerabilities (5:54)
Exploits (7:19)
Risks (1:17)
Security Terms (4:06)
Access Control Models (1:36)
Threat Hunting (1:05)
Zero Trust (1:41)
Threat intelligence platform (TIP) (1:59)
Authentication, Authorization, Accounting (12:01)
Rule-based, Time-based & Role-based Access Control (1:05)
CVSS 3.0 (6:33)
Challenges of Data Visibility (network, host, and cloud) in Detection (3:20)
5-tuple (2:20)
Rule-based detection vs. Behavioral and Statistical detection (2:58)
Security Monitoring
Attack Surface Analysis (1:16)
Network Attacks (6:36)
Web Application Attacks (2:16)
Endpoint-Based Attacks (5:41)
Social Engineering and Phishing Attacks (5:07)
Evasion Methods (6:55)
Network Logging (5:14)
Packet Captures (6:23)
NetFlow (2:54)
Monitoring Challenges (4:02)
NextGen IPS Event Types (1:29)
Encryption and Hashing (2:39)
PKI (11:43)
Host-Based Analysis
Microsoft Windows - Introduction (5:31)
Microsoft Windows - Terms (8:40)
Linux - Introduction (2:37)
Linux - Terms (9:46)
Linux File System (2:04)
Endpoint Protection (2:07)
Whitelisting and Blacklisting (4:27)
Systems-Based Sandboxing (3:26)
System Logs (3:55)
Malware Analysis Tool Report (2:26)
Indicators of Compromise and Attack (1:45)
Evidence and Attribution (2:26)
Network Intrusion Analysis
Common Artifact Elements and Protocol Headers (2:14)
Security Analysis with Wireshark (2:39)
NetFlow v5 and Security Events (0:22)
Map Events to Source Technologies (1:58)
True or False? (1:56)
Impact Flags with the Firepower Management Center (FMC) (1:13)
Interpret Basic Regular Expressions (0:50)
Application Layer Protocols (SMTP/POP3/IMAP/HTTP/HTTPS/HTTP2) (0:40)
Security Policies and Procedures
Security Management (2:24)
NIST.SP800-61 r2 (4:56)
Apply the incident handling process (such as NIST.SP800-61) to an event (1:58)
CSIRT (2:31)
Network Profiling (9:28)
Server Profiling (4:38)
PCI (2:18)
HIPAA (1:50)
SOX (1:25)
PSI (0:38)
Intellectual Property (0:52)
SOC Metrics (0:43)
Cyber Kill Chain Model (3:10)
Teach online with
Indicators of Compromise and Attack
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock