Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

Cisco 210-255: Implementing Cisco Cybersecurity Operations (SECOPS)

EDUTAINMENT COURSE

Cisco 210-255: Implementing Cisco Cybersecurity Operations (SECOPS)

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview

The Cisco Cybersecurity Operations show (Exam 210-255) will help prepare someone preparing for the 2 exams of the CCNA Cyber Ops Certification.  It also aids them to get ready to begin working as an associate level analyst within a Security Operations Center (SOC) and help the candidate handle the tasks,  duties and responsibilities working as an analyst in the SOC.  The show will focus on introductory-level skills of basic threat analysis,  event correlation,  identifying malicious activities and using a playbook for incident response.

Objectives
  • Presents real-world solutions for understand Cisco's threat analysis and incident response solution
  • Covers all of the objectives in the CCNA Cyber Ops exam
  • Easy to follow demonstrations of cybersecurity tools,  products,  and solutions
  • Scenarios offered to help learners understand real-world applications
Prerequisites

A basic understanding of using operating systems,  networks,  and the Internet.

Target Audience
  • For anyone who would love to gain a practical skillset in mitigating the risk from,  malware,  Trojans,  hackers,  tracker,  cyber criminals and all online threats.
  • For anyone studying for the Cisco CCNA Cyber Ops certification exam.
Instructor: ITProTV

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you'll watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

  1. ENDPOINT THREAT ANALYSIS AND COMPUTER FORENSICS
1
Start
Overview
2
Start
Read Analysis Reports
3
Start
Read Analysis Reports Part 2
4
Start
Read Analysis Reports Part 3
5
Start
Describe CVSS 3.0
6
Start
Describe CVSS 3.0 Part 2
7
Start
Describe CVSS 3.0 Part 3
8
Start
Understand Windows File Systems
9
Start
Understand Windows File Systems Part 2
10
Start
Understand Linux File Systems
11
Start
Identify Forensic Evidence
12
Start
Identify Forensic Evidence Part 2
  1. NETWORK INTRUSION ANALYSIS
13
Start
Interpret Basic Regular Expressions
14
Start
Interpret Basic Regular Expressions Part 2
15
Start
Describe Protocol Headers
16
Start
Describe Protocol Headers Part 2
17
Start
Describe Protocol Headers Part 3
18
Start
Describe IP Headers
19
Start
Describe IP Headers Part 2
20
Start
Describe IP Headers Part 3
21
Start
Describe ICMP Intrusion
22
Start
Describe ICMP Intrusion Part 2
23
Start
Describe ICMP Intrusion Part 3
24
Start
Describe ICMP Intrusion Part 4
25
Start
Describe Transport Layer Headers
26
Start
Describe Transport Layer Headers Part 2
27
Start
Describe Transport Layer Headers Part 3
28
Start
Describe HTTP Headers
29
Start
Describe HTTP Headers Part 2
30
Start
Describe HTTP Headers Part 3
31
Start
Identify Netflow v5 Records
32
Start
Identify Netflow v5 Records Part 2
33
Start
Examine Intrusion Events
34
Start
Intrusion Event Technologies
35
Start
Intrusion Event Technologies Part 2
36
Start
Intrusion Event Technologies Part 3
37
Start
Intrusion Impact Analysis
38
Start
Intrusion Impact Analysis Part 2
  1. INCIDENT RESPONSE
39
Start
Incident Response Elements
40
Start
Incident Response Elements Part 2
41
Start
Describe CSIRT Goals
42
Start
Identify Cybersec Elements and Frameworks
  1. DATA AND EVENT ANALYSIS
43
Start
Describe Data Normalization
44
Start
Describe 5 Tuple Correlation
45
Start
FirePower Management Console
46
Start
Compare and Contrast Analysis Methods
  1. INCIDENT HANDLING
47
Start
Classify and Categorize Intrusions
48
Start
Classify and Categorize Intrusions Part 2
49
Start
Classify and Categorize Intrusions Part 3
50
Start
Apply NIST.SP800-61 r2 To Events
51
Start
NIST SP800-86 Evidence Handling
52
Start
Apply VERIS Schema Categories
EDUTAINMENT COURSE
?Interactive and entertaining talk-show style format presented by industry leading experts.
USD 59
  • 22:50:00
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months Access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top