SGC Cybersecurity Operations Course Outline
SGC Cybersecurity Operations Course Outline
Introduction
Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding to
security incidents. Teams of people in Security Operations Centers (SOCs) keep a vigilant eye on security
systems, protecting their organizations by detecting and responding to cybersecurity threats. CCNA Cyber Ops
prepares candidates to begin a career working with associate-level cybersecurity analysts within security
operations centers.
Target Audience
The Cisco CCNA® Cybersecurity Operations 1.0 (CyberOps) course is designed for Cisco Networking Academy®
students seeking career-oriented, entry-level security analyst skills. Target students include individuals and IT
professionals who wants to pursue a career in the Security Operation Centre (SOC).
Prerequisites
CCNA Cybersecurity Operations students should have the following skills and knowledge:
Target Certifications
This course aligns with the CCNA Cyber Ops certification. Candidates need to pass the 210-250 SECFND exam
and the 210-255 SECOPS exam to achieve the CCNA Cyber Ops certification.
Curriculum Description
The course has many features to help students understand these concepts:
Rich multimedia content, including interactive activities, videos, games, and quizzes, addresses a variety
of learning styles and help stimulate learning and increase knowledge retention
Virtual environments simulate real-world cybersecurity threat scenarios and create opportunities for
ethical hacking, security monitoring, analysis and resolution
Hands-on labs help students develop critical thinking and complex problem solving skills
Innovative assessments provide immediate feedback to support the evaluation of knowledge and acquired
skills
Technical concepts are explained using language that works well for learners at all levels and embedded
interactive activities break up reading of the content and help reinforce understanding
The curriculum encourages students to consider additional IT education, but also emphasizes applied
skills and hands-on experience
Cisco Packet Tracer activities are designed for use with Packet Tracer 7.0 or later.
Curriculum Objectives
CCNA Cybersecurity Operations 1.0 covers knowledge and skills needed to successfully handle the tasks, duties,
and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC).
Upon completion of the CCNA Cybersecurity Operations 1.0 course, students will be able to perform the following
tasks:
● Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat
events.
● Explain the role of the Cybersecurity Operations Analyst in the enterprise.
● Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat
events.
● Explain the Windows Operating System features and characteristics needed to support cybersecurity
analyses.
● Explain the features and characteristics of the Linux Operating System.
● Analyze the operation of network protocols and services.
● Explain the operation of the network infrastructure.
● Classify the various types of network attacks.
● Use network monitoring tools to identify attacks against network protocols and services.
● Use various methods to prevent malicious access to computer networks, hosts, and data.
● Explain the impacts of cryptography on network security monitoring.
● Explain how to investigate endpoint vulnerabilities and attacks.
● Evaluate network security alerts.
● Analyze network intrusion data to identify compromised hosts and vulnerabilities.
● Apply incident response models to manage network security incidents.
Course Outline
Chapter 1. Cybersecurity and the Security Operations Explain the role of the Cybersecurity Operations Analyst in the
Center enterprise.
1.1 The Danger Explain why networks and data are attacked.
1.2 Fighters in the War Against Cybercrime Explain how to prepare for a career in Cybersecurity operations.
Chapter 2. Windows Operating System Explain the Windows Operating System features and
characteristics needed to support cybersecurity analyses.
2.1 Windows Overview Explain the operation of the Windows Operating System.
Chapter 3. Linux Operating System Explain the features and characteristics of the Linux Operating
System.
Chapter 4. Network Protocols and Services Analyze the operation of network protocols and services.
4.2 Ethernet and Internet Protocol (IP) Explain how the Ethernet and IP protocols support network
communication.
4.3 Connectivity Verification Use common testing utilities to verify and test network connectivity.
4.4 Address Resolution Protocol Explain how the address resolution protocol enables communication
on a network.
4.5 The Transport Layer and Network Services Explain how transport layer protocols and network services support
network functionality.
4.6 Network Services Explain how network services enable network functionality.
5.1 Network Communication Devices Explain how network devices enable wired and wireless network
communication.
5.2 Network Security Infrastructure Explain how devices and services are used to enhance network
security.
5.3 Network Representations Explain how networks and network topologies are represented.
Chapter 6. Principles of Network Security Classify the various types of network attacks.
6.1 Attackers and Their Tools Explain how networks are attacked.
6.2 Common Threats and Attacks Explain the various types of threats and attacks.
Chapter 7. Network Attacks: A Deeper Look Use network monitoring tools to identify attacks that against
network protocols and services.
7.2 Attacking the Foundation Explain how TCP/IP vulnerabilities enable network attacks.
7.3 Attacking What We Do Explain how common network applications and services are vulnerable
to attack.
Chapter 8. Protecting the Network Use various methods to prevent malicious access to computer
networks, hosts, and data.
8.4 Content Filtering Explain how content filtering prevents unwanted data from entering the
network.
8.5 Threat Intelligence Use various intelligence sources to locate current security threats.
Chapter 9. Cryptography and the Public Key Explain the impacts of cryptography on network security
Infrastructure monitoring.
9.2 Public Key Cryptography Explain how the public key infrastructure (PKI) supports network
security.
Chapter 10. Endpoint Security and Analysis Explain how to investigate endpoint vulnerabilities and attacks.
11.1 Technologies and Protocols Explain how security technologies affect security monitoring.
11.2 Log Files Explain the types of log files used in security monitoring
Chapter 12. Intrusion Data Analysis Analyze network intrusion data to identify compromised hosts
and vulnerabilities
12.2 Data Preparation Arrange a variety of log files in preparation for intrusion data analysis.
12.3 Data Analysis Analyze intrusion data to determine the source of an attack.
Chapter 13. Incident Response and Handling Explain how network security incidents are handled by CSIRTs.
13.1 Incident Response Models Apply incident response models to an intrusion event.
13.2 CSIRTs and NIST 800-61r2 Apply standards specified in NIST 800-61r2 to a computer security
incident.
13.3 Case-Based Practice Given a set of logs, isolate a threat actor and recommend an incident
response plan.