Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.1

The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) course is tailored for individuals aiming to become associate-level cybersecurity analysts and IT professionals seeking expertise in cybersecurity operations. This training also supports those pursuing the Cisco Certified Cybersecurity Associate certification.
Course Details

Price:

$4,295.00

Days:

1

Location:

Virtual

Course Overview

The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) course is tailored for individuals aiming to become associate-level cybersecurity analysts and IT professionals seeking expertise in cybersecurity operations. This training also supports those pursuing the Cisco Certified Cybersecurity Associate certification.

– • Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
– • Explain Network Security Monitoring (NSM) tools that are available to the network security analyst.
– • Explain the data that is available to the network security analyst.
– • Describe the basic concepts and uses of cryptography.
– • Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts.
– • Understand common endpoint security technologies.
– • Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors.
– • Identify resources for hunting cyber threats.
– • Explain the need for event data normalization and event correlation.
– • Identify the common attack vectors.
– • Identify malicious activities.
– • Identify patterns of suspicious behaviors.
– • Conduct security incident investigations.
– • Explain the use of a typical playbook in the SOC.
– • Explain the use of SOC metrics to measure the effectiveness of the SOC.
– • Explain the use of a workflow management system and automation to improve the effectiveness of the SOC.
– • Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT).
– • Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format.

• Familiarity with Ethernet and TCP/IP networking
• Working knowledge of the Windows and Linux operating systems
• Familiarity with basics of networking security concepts

• Defining the Security Operations Center
• Understanding Network Infrastructure and Network Security Monitoring Tools
• Exploring Data Type Categories
• Understanding Basic Cryptography Concepts
• Understanding Common TCP/IP Attacks
• Understanding Endpoint Security Technologies
• Understanding Incident Analysis in a Threat-Centric SOC
• Identifying Resources for Hunting Cyber Threats
• Understanding Event Correlation and Normalization
• Identifying Common Attack Vectors
• Identifying Malicious Activity
• Identifying Patterns of Suspicious Behavior
• Conducting Security Incident Investigations
• Using a Playbook Model to Organize Security Monitoring
• Understanding SOC Metrics
• Understanding SOC Workflow and Automation
• Describing Incident Response
• Understanding the Use of VERIS
• Understanding Windows Operating System Basics
• Understanding Linux Operating System Basics
• Lab Outline

Class Dates & Times
Filters Sort results
Reset Apply
5/19/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,295.00
6/23/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,295.00
7/21/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,295.00
8/18/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,295.00
9/15/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,295.00
10/20/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,295.00
11/17/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,295.00
12/15/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,295.00
— Questions?

Information Request

— Empower Change

Invest in Skills & Equality

Support Diversity, Equity, and Inclusion with Every Purchase.

Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.