YoVDO

Cisco Certified CyberOps Associate (200-201) Cert Prep: 5 Security Policies and Procedures

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Risk Management Courses Incident Response Courses Mobile Device Management Courses Configuration Management Courses Security Policies Courses Defense in Depth Courses Cyber Kill Chain Courses

Course Description

Overview

Explore the principles of defense in depth as you prepare for the security policies and procedures portion of the Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.

Syllabus

Introduction
  • Protecting the data
  • Prepare for Cisco CBROPS exam v1.0
  • Setting up your test environment
1. Securing Organizational Assets
  • Summarizing risk management
  • Protecting assets
  • Reviewing configuration management
  • Outlining mobile device management
  • Updating and patching organizational assets
  • Creating security policies
  • Challenge: Create a security policy
  • Solution: Create a security policy
2. Handling Incidents
  • Understanding incidents
  • Preparing for an incident
  • Detecting incidents
  • Managing incidents
  • Collecting evidence
  • Closing an incident
3. Identifying Endpoint Vulnerabilities
  • Understanding network profiling
  • Profiling server behavior
  • Challenge: Examine suspect IP addresses
  • Solution: Examine suspect IP addresses
4. Limiting the Effects of Intrusions
  • Identifying protected data
  • Outlining the Cyber Kill Chain Model
  • Pivoting through the Diamond Model of Intrusion
  • Evaluating SOC key performance indicators
  • Challenge: The Cyber Kill Chain
  • Solution: The Cyber Kill Chain
Conclusion
  • Next steps

Taught by

Lisa Bock

Related Courses

Microsoft Enterprise Mobility Suite
Microsoft via edX
Managing Microsoft Exchange Online in Office 365
Microsoft via edX
Systems and Application Security
(ISC)² via Coursera
Managing G Suite
Google Cloud via Coursera
Enrolling, Securing, and Managing Devices with Microsoft Intune
Pluralsight