CBROPS: Security Events, Firewall Operations, & Traffic Analysis

Cisco CBROPS
  • 4 Videos | 1h 12m 14s
  • Includes Assessment
  • Earns a Badge
In this course, you'll learn to categorize intrusion events according to the cyber kill chain and diamond intrusion models. Next, with so many tools available, you'll examine which ones should be used to identify different security events. You'll learn the differences between deep packet inspection, packet filtering, and stateful firewall operations. Finally, you'll review the differences between inline traffic interrogation, taps, and traffic monitoring. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.

WHAT YOU WILL LEARN

  • determine infrastructure elements that are used during the Diamon Model of Intrusion
    identify the phases of the Cyber Kill Chain model
    recognize the phase of the Cyber Kill Chain that may involve a phishing attack
    identify key information being monitored with network application control
    identify the types of events that occur during network intrusion analysis
    recognize traffic patterns being monitored in a virtualization environment
  • identify the layer of the OSI model that a DPI firewall runs at
    recognize the firewall type that only inspects the header of the packet
    identify monitoring features that can be configured on a Cisco device to monitor specific traffic
    identify the different methods to perform inline traffic interrogation
    recognize features of a Cisco switch that allows you to monitor network traffic

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.