CBROPS: Security Events, Firewall Operations, & Traffic Analysis
4 Videos | 1h 12m 14s
- Includes Assessment
- Earns a Badge
In this course, you'll learn to categorize intrusion events according to the cyber kill chain and diamond intrusion models. Next, with so many tools available, you'll examine which ones should be used to identify different security events. You'll learn the differences between deep packet inspection, packet filtering, and stateful firewall operations. Finally, you'll review the differences between inline traffic interrogation, taps, and traffic monitoring. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
WHAT YOU WILL LEARN
determine infrastructure elements that are used during the Diamon Model of Intrusionidentify the phases of the Cyber Kill Chain modelrecognize the phase of the Cyber Kill Chain that may involve a phishing attackidentify key information being monitored with network application controlidentify the types of events that occur during network intrusion analysisrecognize traffic patterns being monitored in a virtualization environment
identify the layer of the OSI model that a DPI firewall runs atrecognize the firewall type that only inspects the header of the packetidentify monitoring features that can be configured on a Cisco device to monitor specific trafficidentify the different methods to perform inline traffic interrogationrecognize features of a Cisco switch that allows you to monitor network traffic
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE