Cisco® Securing Cisco® Networks with Threat Detection and Analysis (SCYBER) 1.0 New Horizons Ireland
السعر: 3,750 EUR

    تفاصيل الدورة

    This course is designed to teach students how a network security operations center (SOC) works and how to begin to monitor, analyze, and respond to security threats within the network.

    Course Outline1 -

    1 - Attacker Methodology

    • Defining the Attacker Methodology
    • Identifying Malware and Attacker Tools
    • Understanding Attacks

    2 - Defender Methodology

    • Enumerating Threats, Vulnerabilities, and Exploits
    • Defining SOC Services
    • Defining SOC Procedures
    • Defining the Role of a Network Security Analyst
    • Identifying a Security Incident

    3 - Defender Tools

    • Collecting Network Data
    • Understanding Correlation and Baselines
    • Assessing Sources of Data
    • Understanding Events
    • Examining User Reports
    • Introducing Risk Analysis and Mitigation

    4 - Packet Analysis

    • Identifying Packet Data
    • Analyzing Packets Using Cisco IOS Software
    • Accessing Packets in Cisco IOS Software
    • Acquiring Network Traces
    • Establishing a Packet Baseline
    • Analyzing Packet Traces

    5 - Network Log Analysis

    • Using Log Analysis Protocols and Tools
    • Exploring Log Mechanics
    • Retrieving Syslog Data
    • Retrieving DNS Events and Proxy Logs
    • Correlating Log Files

    6 - Baseline Network Operations

    • Baselining Business Processes
    • Mapping the Network Topology
    • Managing Network Devices
    • Baselining Monitored Networks
    • Monitoring Network Health

    7 - Incident Response Preparation

    • Defining the Role of the SOC
    • Establishing Effective Security Controls
    • Establishing an Effective Monitoring System

    8 - Security Incident Detection

    • Correlating Events Manually
    • Correlating Events Automatically
    • Assessing Incidents
    • Classifying Incidents
    • Attributing the Incident Source

    9 - Investigations

    • Scoping the Investigation
    • Investigating Through Data Correlation
    • Understanding NetFlow
    • Investigating Connections Using NetFlow

    10 - Mitigations and Best Practices

    • Mitigating Incidents
    • Using ACLs
    • Implementing Network-Layer Mitigations and Best Practices
    • Implementing Link-Layer Best Practices

    11 - Communication

    • Documenting Communication
    • Documenting Incident Details

    12 - Post-Event Activity

    • Conducting an Incident Post-Mortem
    • Improving Security of Monitored Networks

    Target Audience: This course is designed for technical professionals who need to know how to monitor, analyze, and respond to network security threats and attacks.

    تحديث بتاريخ 08 November, 2015

    نبذة عن معهد New Horizons Ireland

    With a very convenient location next to Jervis street in Dublin 1, we offer a wide range of IT and business skills courses and we can also send our instructors to your location.

    We are 100% Irish owned, but we are also part of the largest independent IT Training Provider, New Horizons Computer Learning Centres who deliver more courses than any other IT training company.

    Because we're local, we understand the needs of business and individuals in our community. Whether you choose to take classes in person or online, you're always welcome to call or stop by.

    عرض الجميع دورات New Horizons Ireland
    Are you from New Horizons Ireland ? Claim your course!
    دورات يمكنك الالتحاق بها على الفور... خذ دورة عبر الإنترنت على Cisco ابتداءً من الآن. See all courses

    هل هذه الدورة التدريبية الاختيار المناسب لك؟

    قيِم هذه الصفحة

    لم تجد ما كنت تبحث عنه؟

    أو