Curso Securing Cisco Networks with Threat Detection and Analysis (SCYBER)
Carga horária: 40 horas (5 dias)
Descrição do Curso SCYBER (em inglês)
Course Prerequisites
It is recommended, but not required, to have the following skills and knowledge before attending this course:
- CCNA equivalent knowledge is preferred
- Basic understanding of Cisco security product features
- Basic understanding of open-source and commercial network security tools
- Basic understanding of Microsoft Windows and UNIX/Linux operating systems, desktops, and servers
- Basic understanding of the Open Systems Interconnection (OSI) model and TCP/IP
Course Description
This lab-intensive training course prepares you to hit the ground running as an entry level security analyst team member. The course combines lecture materials and hands-on labs throughout to make sure that you are able to successfully understand cyber security concepts and to recognize specific threats and attacks on your network. It will teach you how a network security operations center (SOC) works and how to begin to monitor, analyze, and respond to security threats within the network. The job role for a security analyst will vary from industry to industry and differ in the private sector versus the public sector
Course Objectives
Upon completion of this course, you will be able to:
- Describe the tools, techniques, and thought processes of an attacker
- Describe the features, functions, and benefits of an SOC
- Identify the common sources used to detect an incident, as well as the actions that should be considered in response
- Perform basic packet capture and packet analysis
- Enable syslog on Cisco devices and to perform basic network log analysis
- Discuss the relevance of baselining and some of the most useful steps to be used when deploying a system
- Discuss the policies and roles in the typical SOC, as well as some of the common tools used by SOC members
- Discuss techniques used to identify anomalies and correlate log entries
- Understand techniques used to scope, document, and analyze investigations
- Discuss the methodology behind mitigations
- Discuss documentation and communication during an incident
- Discuss post-incident considerations
Job Roles
- Professional security analysts
- Security engineers
Faça seu treinamento com os melhores
Pagamentos no PagSeguro com segurança e flexibilidade em até 12 vezes
Ementa do Curso
- Module 1: Attacker Methodology
- Lesson 1-1: Defining the Attacker Methodology
- Lesson 1-2: Identifying Malware and Attacker Tools
- Lesson 1-3: Understanding Attacks
- Lesson 1-4: References
- Lesson 1-5: Module Challenge
- Module 2: Defender Methodology
- Lesson 2-1: Enumerating Threats, Vulnerabilities, and Exploits
- Lesson 2-2: Defining SOC Services
- Lesson 2-3: Defining SOC Procedures
- Lesson 2-4: Defining the Role of a Network Security Analyst
- Lesson 2-5: Identifying a Security Incident
- Lesson 2-6: References
- Lesson 2-7: Module Challenge
- Module 3: Defender Tools
- Lesson 3-1: Collecting Network Data
- Lesson 3-2: Understanding Correlation and Baselines
- Lesson 3-3: Assessing Sources of Data
- Lesson 3-4: Understanding Events
- Lesson 3-5: Examining User Reports
- Lesson 3-6: Introducing Risk Analysis and Mitigation
- Lesson 3-7: References
- Lesson 3-8: Module Challenge
- Module 4: Packet Analysis
- Lesson 4-1: Identifying Packet Data
- Lesson 4-2: Analyzing Packets Using Cisco IOS Software
- Lesson 4-3: Accessing Packets in Cisco IOS Software
- Lesson 4-4: Acquiring Network Traces
- Lesson 4-5: Establishing a Packet Baseline
- Lesson 4-6: References
- Lesson 4-7: Module Challenge
- Module 5: Network Log Analysis
- Lesson 5-1: Using Log Analysis Protocols and Tools
- Lesson 5-2: Exploring Log Mechanics
- Lesson 5-3: Retrieving Syslog Data
- Lesson 5-4: Retrieving DNS Events and Proxy Logs
- Lesson 5-5: Correlating Log Files
- Lesson 5-6: References
- Lesson 5-7: Module Challenge
- Module 6: Baseline Network Operations
- Lesson 6-1: Baselining Business Processes
- Lesson 6-2: Mapping the Network Topology
- Lesson 6-3: Managing Network Devices
- Lesson 6-4: Baselining Monitored Networks
- Lesson 6-5: Monitoring Network Health
- Lesson 6-6: References
- Lesson 6-7: Module Challenge
- Module 7: Incident Response Preparation
- Lesson 7-1: Defining the Role of the SOC
- Lesson 7-2: Establishing Effective Security Controls
- Lesson 7-3: Establishing an Effective Monitoring System
- Lesson 7-4: References
- Lesson 7-5: Module Challenge
- Module 8: Security Incident Detection
- Lesson 8-1: Correlating Events Manually
- Lesson 8-2: Correlating Events Automatically
- Lesson 8-3: Assessing Incidents
- Lesson 8-4: Classifying Incidents
- Lesson 8-5: Attributing the Incident Source
- Lesson 8-6: References
- Lesson 8-7: Module Challenge
- Module 9: Investigations
- Lesson 9-1: Scoping the Investigation
- Lesson 9-2: Investigating Through Data Correlation
- Lesson 9-3: Understanding NetFlow
- Lesson 9-4: Investigating Connections Using NetFlow
- Lesson 9-5: References
- Lesson 9-6: Module Challenge
- Module 10: Mitigations and Best Practices
- Lesson 10-1: Mitigating Incidents
- Lesson 10-2: Cisco Cyber Threat Defense Overview
- Lesson 10-3: Implementing Cisco IOS ACLs and Zone-Based Policy Firewall
- Lesson 10-4: Implementing Network-Layer Mitigations and Best Practices
- Lesson 10-5: Implementing Link-Layer Best Practices
- Lesson 10-6: References
- Lesson 10-7: Module Challenge
- Module 11: Communication
- Lesson 11-1: Documenting Incident Details
- Lesson 11-2: Communicating Incidents
- Lesson 11-3: References
- Lesson 11-4: Module Challenge
- Module 12: Post-Event Activity
- Lesson 12-1: Conducting an Incident Post-Mortem
- Lesson 12-2: Improving Security of Monitored Networks
- Lesson 12-3: References
- Lesson 12-4: Module Challenge
Laboratórios e Atividades Práticas
O curso é repleto de atividades práticas em laboratórios providos pela Cisco, o que torna a experiência de aprendizado bastante proveitosa!
- Guided Lab 1: Case Study 2-1 Assessing Your Understanding of Network and Security Operations
- Guided Lab 2: Lab 3-1 Exploring the Remote Lab Environment
- Guided Lab 3: Lab 3-2 Enabling Netflow Export and Syslog
- Guided Lab 4: Lab 4-1 Capturing Packets on the Pod Router and using Wireshark to examine the PCAP
- Guided Lab 5: Lab 4-2 Capturing Packets using TCPDUMP
- Guided Lab 6: Lab 5-1 Examining Logs Manually
- Guided Lab 7: Lab 6-1 Enabling AAA for Router SSH Management Access
- Guided Lab 8: Lab 6-2 Enabling SMNPv3 on the Pod Router and Pod Switch
- Guided Lab 9: Lab 7-1 Performing NMAP Scans and Using Netcat to Connect to Open Ports
- Guided Lab 10: Lab 8-1 Analyzing PCAP File with Suspicious Activities Using Wireshark
- Guided Lab 11: Lab 8-2 Examining Event Logs Manually
- Guided Lab 12: Lab 8-3 Examining Event Logs Using Splunk
- Guided Lab 13: Lab 9-1 Analyzing NetFlow Data with Lancope StealthWatch
- Guided Lab 14: Lab 10-1 Implementing IOS Zone-Based Firewall
- Guided Lab 15: Lab 11-1 Incident Response
Conheça mais sobre a nossa visão sobre as certificações da Cisco aqui!
Valores do Curso
- Reais (BRL): R$ 7.500,00
- Cisco Learning Credits (CLC): 19
OBS: preços válidos para treinamentos presenciais na cidade do Rio de Janeiro ou para treinamentos VILT (Online/WebEx).
Próximos Treinamentos Securing Cisco Networks with Threat Detection and Analysis (SCYBER) 1.2
novembro 2024
Sem Treinamentos / Eventos
dezembro 2024
Sem Treinamentos / Eventos