0%

Book Description

Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed, SOCs desperately need more qualified cybersecurity professionals. Cisco’s new Cisco Certified CyberOps Associate certification prepares candidates to begin a career working as associate-level cybersecurity analysts within SOCs. It demonstrates their knowledge about creating, operating, and working within computer security incident response teams (CSIRTs) and product security incident response teams (PSIRTs); the incident response lifecycle, and cyber forensics. To earn this valuable certification, candidates must pass the new Understanding Cisco Cybersecurity Operations Fundamentals (200-201 CBROPS) consolidated exam. Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide is Cisco’s official, comprehensive self-study resource for this exam. Designed for all exam candidates, it covers every exam objective concisely and logically, with extensive teaching features that promote retention and understanding. You’ll find:

  • Pre-chapter quizzes to assess knowledge upfront and focus your study more efficiently

  • Foundation topics sections that explain concepts and configurations, and link theory to practice

  • Key topics sections calling attention to every figure, table, and list you must know

  • Exam Preparation sections with additional chapter review features

  • Final preparation chapter providing tools and a complete final study plan

  • A customizable practice test library

This guide offers comprehensive, up-to-date coverage of all CBROPS #200-201 topics related to:

  • Security concepts

  • Security monitoring

  • Host-based analysis

  • Network intrusion analysis

  • Security policies and procedures

Book Description

Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed, SOCs desperately need more qualified cybersecurity professionals. Cisco’s new Cisco Certified CyberOps Associate certification prepares candidates to begin a career working as associate-level cybersecurity analysts within SOCs. It demonstrates their knowledge about creating, operating, and working within computer security incident response teams (CSIRTs) and product security incident response teams (PSIRTs); the incident response lifecycle, and cyber forensics. To earn this valuable certification, candidates must pass the new Understanding Cisco Cybersecurity Operations Fundamentals (200-201 CBROPS) consolidated exam. Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide is Cisco’s official, comprehensive self-study resource for this exam. Designed for all exam candidates, it covers every exam objective concisely and logically, with extensive teaching features that promote retention and understanding. You’ll find:

  • Pre-chapter quizzes to assess knowledge upfront and focus your study more efficiently

  • Foundation topics sections that explain concepts and configurations, and link theory to practice

  • Key topics sections calling attention to every figure, table, and list you must know

  • Exam Preparation sections with additional chapter review features

  • Final preparation chapter providing tools and a complete final study plan

  • A customizable practice test library

This guide offers comprehensive, up-to-date coverage of all CBROPS #200-201 topics related to:

  • Security concepts

  • Security monitoring

  • Host-based analysis

  • Network intrusion analysis

  • Security policies and procedures

Table of Contents

  1. Cover Page
  2. Title Page
  3. Copyright
  4. About the Author(s)
  5. Dedication
  6. Acknowledgments
  7. Contents at a Glance
  8. Table of Contents
  9. Introduction
    1. The Cisco CyberOps Associate Certification
    2. The Exam Objectives (Domains)
    3. Steps to Pass the 200-201 CBROPS Exam
    4. Facts About the Exam
    5. About the Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
    6. The Companion Website for Online Content Review
    7. How to Access the Pearson Test Prep (PTP) App
    8. Customizing Your Exams
    9. Updating Your Exams
  10. Chapter 1. Cybersecurity Fundamentals
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Introduction to Cybersecurity
    4. Threats, Vulnerabilities, and Exploits
    5. Network Security Systems
    6. Intrusion Detection Systems and Intrusion Prevention Systems
    7. Advanced Malware Protection
    8. Web Security Appliance
    9. Email Security Appliance
    10. Cisco Security Management Appliance
    11. Cisco Identity Services Engine
    12. Security Cloud-Based Solutions
    13. Cisco NetFlow
    14. Data Loss Prevention
    15. The Principles of the Defense-in-Depth Strategy
    16. Confidentiality, Integrity, and Availability: The CIA Triad
    17. Risk and Risk Analysis
    18. Personally Identifiable Information and Protected Health Information
    19. Principle of Least Privilege and Separation of Duties
    20. Security Operations Centers
    21. Playbooks, Runbooks, and Runbook Automation
    22. Digital Forensics
    23. Exam Preparation Tasks
    24. Review All Key Topics
    25. Define Key Terms
    26. Review Questions
  11. Chapter 2. Introduction to Cloud Computing and Cloud Security
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Cloud Computing and the Cloud Service Models
    4. Cloud Security Responsibility Models
    5. DevOps, Continuous Integration (CI), Continuous Delivery (CD), and DevSecOps
    6. Understanding the Different Cloud Security Threats
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Review Questions
  12. Chapter 3. Access Control Models
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Information Security Principles
    4. Subject and Object Definition
    5. Access Control Fundamentals
    6. Access Control Process
    7. Information Security Roles and Responsibilities
    8. Access Control Types
    9. Access Control Models
    10. Access Control Mechanisms
    11. Identity and Access Control Implementation
    12. Exam Preparation Tasks
    13. Review All Key Topics
    14. Define Key Terms
    15. Review Questions
  13. Chapter 4. Types of Attacks and Vulnerabilities
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Types of Attacks
    4. Types of Vulnerabilities
    5. Exam Preparation Tasks
    6. Review All Key Topics
    7. Define Key Term
    8. Review Questions
  14. Chapter 5. Fundamentals of Cryptography and Public Key Infrastructure (PKI)
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Cryptography
    4. Block and Stream Ciphers
    5. Symmetric and Asymmetric Algorithms
    6. Hashes
    7. Digital Signatures
    8. Next-Generation Encryption Protocols
    9. IPsec and SSL/TLS
    10. Fundamentals of PKI
    11. Root and Identity Certificates
    12. Revoking Digital Certificates
    13. Using Digital Certificates
    14. Exam Preparation Tasks
    15. Review All Key Topics
    16. Define Key Terms
    17. Review Questions
  15. Chapter 6. Introduction to Virtual Private Networks (VPNs)
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. What Are VPNs?
    4. Site-to-Site vs. Remote-Access VPNs
    5. An Overview of IPsec
    6. SSL VPNs
    7. Exam Preparation Tasks
    8. Review All Key Topics
    9. Define Key Terms
    10. Review Questions
  16. Chapter 7. Introduction to Security Operations Management
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Introduction to Identity and Access Management
    4. Security Events and Log Management
    5. Asset Management
    6. Introduction to Enterprise Mobility Management
    7. Configuration and Change Management
    8. Vulnerability Management
    9. Patch Management
    10. Exam Preparation Tasks
    11. Review All Key Topics
    12. Define Key Terms
    13. Review Questions
  17. Chapter 8. Fundamentals of Intrusion Analysis
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Introduction to Incident Response
    4. The Incident Response Plan
    5. The Incident Response Process
    6. Information Sharing and Coordination
    7. Incident Response Team Structure
    8. Common Artifact Elements and Sources of Security Events
    9. Understanding Regular Expressions
    10. Protocols, Protocol Headers, and Intrusion Analysis
    11. How to Map Security Event Types to Source Technologies
    12. Exam Preparation Tasks
    13. Review All Key Topics
    14. Define Key Terms
    15. Review Questions
  18. Chapter 9. Introduction to Digital Forensics
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Introduction to Digital Forensics
    4. The Role of Attribution in a Cybersecurity Investigation
    5. The Use of Digital Evidence
    6. Evidentiary Chain of Custody
    7. Reverse Engineering
    8. Fundamentals of Microsoft Windows Forensics
    9. Fundamentals of Linux Forensics
    10. Exam Preparation Tasks
    11. Review All Key Topics
    12. Define Key Terms
    13. Review Questions
  19. Chapter 10. Network Infrastructure Device Telemetry and Analysis
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Network Infrastructure Logs
    4. Traditional Firewall Logs
    5. Syslog in Large-Scale Environments
    6. Next-Generation Firewall and Next-Generation IPS Logs
    7. NetFlow Analysis
    8. Network Packet Capture
    9. Network Profiling
    10. Exam Preparation Tasks
    11. Review All Key Topics
    12. Define Key Terms
    13. Review Questions
  20. Chapter 11. Endpoint Telemetry and Analysis
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Understanding Host Telemetry
    4. Host Profiling
    5. Analyzing Windows Endpoints
    6. Linux and macOS Analysis
    7. Endpoint Security Technologies
    8. Exam Preparation Tasks
    9. Review All Key Topics
    10. Define Key Terms
    11. Review Questions
  21. Chapter 12. Challenges in the Security Operations Center (SOC)
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Security Monitoring Challenges in the SOC
    4. Additional Evasion and Obfuscation Techniques
    5. Exam Preparation Tasks
    6. Review All Key Topics
    7. Define Key Terms
    8. Review Questions
  22. Chapter 13. The Art of Data and Event Analysis
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Normalizing Data
    4. Using the 5-Tuple Correlation to Respond to Security Incidents
    5. Using Retrospective Analysis and Identifying Malicious Files
    6. Mapping Threat Intelligence with DNS and Other Artifacts
    7. Using Deterministic Versus Probabilistic Analysis
    8. Exam Preparation Tasks
    9. Review All Key Topics
    10. Define Key Terms
    11. Review Questions
  23. Chapter 14. Classifying Intrusion Events into Categories
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. Diamond Model of Intrusion
    4. Cyber Kill Chain Model
    5. The Kill Chain vs. MITRE’s ATT&CK
    6. Exam Preparation Tasks
    7. Review All Key Topics
    8. Define Key Terms
    9. Review Questions
  24. Chapter 15. Introduction to Threat Hunting
    1. “Do I Know This Already?” Quiz
    2. Foundation Topics
    3. What Is Threat Hunting?
    4. The Threat-Hunting Process
    5. Threat Hunting and MITRE’s ATT&CK
    6. Threat-Hunting Case Study
    7. Threat Hunting, Honeypots, Honeynets, and Active Defense
    8. Exam Preparation Tasks
    9. Review All Key Topics
    10. Define Key Terms
    11. Review Questions
  25. Chapter 16. Final Preparation
    1. Hands-on Activities
    2. Suggested Plan for Final Review and Study
    3. Summary
  26. Glossary of Key Terms
  27. Appendix A. Answers to the “Do I Know This Already?” Quizzes and Review Questions
  28. Appendix B. Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS 200-201) Exam Updates
  29. Appendix C: Study Planner
3.145.156.250