CyberOps Associate (3op)
Opintojakson tunnus: C-10065-TT00GM75
Opintojakson perustiedot
- Laajuus
- 3 op
- Opetuskieli
- englanti
- Korkeakoulu
- Metropolia Ammattikorkeakoulu
Osaamistavoitteet
This course introduces you to the exciting and rapidly evolving world of cybersecurity, where you will learn how to monitor, detect, and respond to cyber threats. By the end of this course, you will be prepared to take the Cisco Certified CyberOps Associate certification, positioning yourself for roles in Security Operations Centers (SOC) and other cybersecurity-focused environments.
What You Will Learn
During this course, you will develop the foundational knowledge and practical skills required to work as a SOC Analyst. You will gain hands-on experience in:
- Monitoring and detection of security events and incidents.
- Responding effectively to cybersecurity threats.
- Analyzing host-based and network-based data to identify malicious activity.
- Applying security policies and procedures to secure IT environments.
Key Concepts and Terminology
You will become familiar with essential cybersecurity concepts, including:
SOC (Security Operations Center) – A centralized team that monitors, detects, and responds to security incidents.
Malware – Malicious software designed to harm, exploit, or otherwise compromise systems.
Endpoint Threat Analysis – Examination of devices like computers and mobile phones to detect suspicious activities.
Network Intrusion Analysis – Investigating and detecting unauthorized access or anomalies within network traffic.
Incident Response (IR) – The structured approach to handling and managing the aftermath of a security breach.
Cryptography – Techniques for securing information through encryption.
Threat Intelligence – Information that helps understand and anticipate cyber threats.
Skills You Will Develop
Cybersecurity fundamentals and threat detection
Malware and endpoint threat analysis
Network intrusion detection and analysis
Incident response techniques
Security policy implementation and monitoring
Data and event analysis with SOC metrics
Cryptography and secure communications
Sisältö
Module 1: The Danger
Module 2: Fighter in the War Against Cybercrime
- Checkpoint Exam: Threat Actors and Defenders Group Exam
Module 3: The Windows Operating System
Module 4: Linux Overview
- Checkpoint Exam: Operating System Overview Group Exam
Module 5: Network Protocols
Module 6: Ethernet and Internet Protocol (IP)
Module 7: Connectivity Verification
Module 8: Address Resolution Protocol
Module 9: The Transport Layer
Module 10: Network Services
- Checkpoint Exam: Network Fundamentals Group Exam
Module 11: Network Communication Devices
Module 12: Network Security Infrastructure
- Checkpoint Exam: Network Infrastructure Security Group Exam
Module 13: Attackers and Their Tools
Module 14: Common Threats and Attacks
Module 15: Network Monitoring and Tools
Module 16: Attacking the Foundation
Module 17: Attacking What We Do
- Checkpoint Exam: Threats and Attacks Group Exam
Module 18: Understanding Defense
Module 19: Access Control
Module 20: Threat Intelligence
- Checkpoint Exam: Network Defense Group Exam
Module 21: Cryptography
Module 22: Endpoint Protection
Module 23: Endpoint Vulnerability Assessment
- Checkpoint Exam: Cryptography and Endpoint Protection Group Exam
Module 24: Technologies and Protocols
Module 25: Network Security Data
- Checkpoint Exam: Protocols and Log Files Group Exam
Module 26: Evaluating Alerts
Module 27: Working with Network Security Data
Module 28: Digital Forensics and Incident Analysis and Response
- Checkpoint Exam: Analyzing Security Data Group Exam
Cisco Cybersecurity Associate v1.2 Certification Practice Exam
- CyberOps Associate 1.0 Practice Final exam
- CyberOps Associate 1.0 Final exam
Arviointikriteeri, hyväksytty/hylätty
Pass after all of 28 Modules have been done and both Practical Exam and Final Exam passed.