CBROPS: Security Events, Firewall Operations, & Traffic Analysis

Cisco CBROPS    |    Intermediate
  • 4 videos | 1h 12m 14s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 39 users Rating 4.6 of 39 users (39)
In this course, you'll learn to categorize intrusion events according to the cyber kill chain and diamond intrusion models. Next, with so many tools available, you'll examine which ones should be used to identify different security events. You'll learn the differences between deep packet inspection, packet filtering, and stateful firewall operations. Finally, you'll review the differences between inline traffic interrogation, taps, and traffic monitoring. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.

WHAT YOU WILL LEARN

  • Recognize the phase of the cyber kill chain that may involve a phishing attack
    determine infrastructure elements that are used during the diamon model of intrusion
    identify the phases of the cyber kill chain model
    Identify key information being monitored with network application control
    identify the types of events that occur during network intrusion analysis
    recognize traffic patterns being monitored in a virtualization environment
  • Recognize the firewall type that only inspects the header of the packet
    identify the layer of the osi model that a dpi firewall runs at
    Recognize features of a cisco switch that allows you to monitor network traffic
    identify the different methods to perform inline traffic interrogation
    identify monitoring features that can be configured on a cisco device to monitor specific traffic

IN THIS COURSE

  • Locked
    1.  Intrusion Events
    20m 25s
  • Locked
    2.  Identifying Security Events
    20m 43s
  • Locked
    3.  Comparing Firewall Operations
    12m 26s
  • Locked
    4.  Comparing Traffic Analysis Techniques
    18m 40s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 27 users Rating 4.4 of 27 users (27)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.5 of 36 users Rating 4.5 of 36 users (36)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 29 users Rating 4.5 of 29 users (29)
Rating 4.6 of 25 users Rating 4.6 of 25 users (25)
Rating 4.2 of 21 users Rating 4.2 of 21 users (21)