Course Overview

Cybersecurity threats are constantly evolving, making it crucial for security professionals to develop strong analytical and investigative skills. The Cisco Certified CyberOps Associate (200-201) - Part 2 course focuses on host-based analysis, network intrusion detection, and security policies to help learners understand how to detect, analyze, and respond to security incidents effectively. By mastering these concepts, cybersecurity analysts can better safeguard critical systems, detect malicious activity, and respond to cyber threats in a structured and efficient manner.

This course begins with host-based analysis, covering endpoint security technologies, forensic evidence identification, system logs, and malware analysis. Learners will explore key components of Microsoft Windows and Linux operating systems to understand how attackers leave traces behind. The network intrusion analysis section delves into security technologies such as firewalls, IPS alerts, and traffic analysis using tools like Wireshark and NetFlow. Finally, the security policies and procedures module provides insight into incident response frameworks like NIST.SP800-61, security management concepts, and methodologies such as the Cyber Kill Chain and Diamond Model of Intrusion to enhance proactive threat detection and response strategies.

By completing this course, learners will gain essential skills in forensic investigation, network monitoring, and incident response, enabling them to effectively identify and mitigate cyber threats.

What You Will Learn

  • You will learn to prevent , detect and respond to cybersecurity threats and breaches.
  • You will discover common attack vectors.
  • You will be able to basic concepts and uses of cryptography.
  • You will explore various endpoint security technologies
  • You will understand various TCP/IP vulnerabilities and attacks

Program Curriculum

  • Introduction
  • Delving into Endpoint Security Technologies
  • Identifying Components within Microsoft Windows
  • Exploring Components in the Linux Operating System
  • Understanding the Attribution in an Investigation
  • Identifying Various Types of Evidence
  • Understanding Tampered and Untampered Disk Image
  • Exploring Operating System, Application, and Command Logs
  • Delving in Malware Analysis
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Introduction
  • Mapping Events to Security Technologies
  • Comparing Antimalware and IPS Alert Types
  • Exploring Firewall Operations
  • Interpreting Traffic Analysis on a Network
  • Transaction Data (NetFlow) in the Analysis of Network Traffic
  • Extracting Files from a TCP Stream using Wireshark
  • Understanding the Key Elements in an Intrusion from a PCAP File
  • Identifying Fields in Protocol Headers Related to an Intrusion
  • Interpreting Common Artifact Elements from an Event
  • Understanding Basic Regular Expressions
  • Chapter 2 Quiz

  • Introduction
  • Security Management Concepts
  • Elements of Incident Response using NIST.SP800-61
  • NIST.SP800-61 Incident Response Handling Process
  • Discovering Network and Server Profiling
  • Types of Protected Data on a Network
  • Understanding the Cyber Kill Chain
  • Exploring the Diamond Model of Intrusion
  • Understanding SOC Metrics
  • Conclusion
  • Chapter 3 Quiz

Instructor

Glen Singh

Glen D. Singh, CEH, CHFI, CCNA (CyberOps, Security, and Routing & Switching) is a cybersecurity instructor, author, and consultant. He specializes in penetration testing, digital forensics, network security, and enterprise networking. He enjoys teaching and mentoring students, writing books, and participating in a range of outdoor activities. As an aspiring game-changer, Glen is passionate about developing cyber security awareness in his homeland, Trinidad and Tobago. Glen is also the author of the following books: Learn Kali Linux 2019 Hands-On Penetration Testing with Kali NetHunter CompTIA Network+ Certification Guide CCNA Security 210-260 Certification Guide

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering video-based learning with 840+ courses and diverse Learning Paths to enhance your skills.

$ 69.00
Billed monthly or $599.00 billed annually

What is included

  • 840+ Premium Short Courses
  • 70+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs and CTF Challenges for comprehensive skill-building.

$ 79.00
Billed monthly or $699.00 billed annually

Everything in Pro and

  • 1400+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month

Related Courses

1 of 50