CCNA Cyber Ops SECOPS 210-255
4+ Hours of Video Instruction
More than four and a half hours of video instruction on configuration and troubleshooting tasks to prepare you for the Cisco CCNA Cyber Ops SECOPS 210-255 certification exam.
CCNA Cyber Ops SECOPS 210-255 is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-255 SECOPS exam. This product walks through each topic of the Implementing Cisco Cybersecurity Operations exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as a Security Operations Center (SOC) security analyst.
CCNA Cyber Ops SECOPS 210-255 contains more than four and a half hours of instruction with 11 lessons. The videos consist of live video training, video screencasts, and demos. Video instruction throughout offers detailed explanations, tips, and design recommendations.Major topics include
- Endpoint Threat Analysis and Computer Forensics
- Network Intrusion Analysis
- Incident Response
- Data and Event Analysis
- Incident Handling
Beginning to intermediate
- Real-world solutions for understand the Cisco threat analysis and incident response solution
- All the objectives in the CCNA Cyber Ops exam
- Easy-to-follow demonstrations of cybersecurity tools, products, and solutions
- Scenarios offered to help learners understand real-world applications
Who Should Take This Course
Anyone who wants to obtain their CCNA Cyber Ops certification. This includes security professionals interested in learning how to develop, manage, or improve a security operations center, a CSIRT, a PSIRT, or anyone who wants to become a cybersecurity incident response expert. Anyone wishing to take the CCNA CyberOps exam would also benefit from viewing this course.
The video course assumes that the learner has the skills to navigate the user interface of a PC running Windows, Mac, or Linux and who has completed typical high school-level math courses (mainly that the reader has been exposed to binary math). The course also assumes that the reader has used PCs connected to either a home network or a network inside a school or company, but that the reader might not understand anything about the network to which the PC was connected. It also assumes that the reader knows how to use typical Internet applications, primarily web browsers and email clients.
About LiveLessons Video Training
LiveLessons Video Training series publishes hundreds of hands-on, expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. This professional and personal technology video series features world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, IBM Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT Certification, Programming, Web Development, Mobile Development, Home and Office Technologies, Business and Management, and more. View all LiveLessons on InformIT at http://www.ciscopress.com/livelessons.
Omar Santos is an active member of the cyber security community, where he leads several industry-wide initiatives and standards bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to increasing the security of their critical infrastructures. Omar is the author of more than a dozen books and video courses, as well as numerous white papers, articles, and security configuration guidelines and best practices. Omar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities. Additional information about Omar’s current projects can be found at omarsantos.io, and you can follow Omar on Twitter: @santosomar.
StartLearning objectives (0:34)
Start2.1 Examining Types of Evidence (7:40)
Start2.2 Surveying Windows Forensics: Application Processes, Threads, and Vulnerabilities (3:36)
Start2.3 Surveying Windows Forensics: Memory (5:55)
Start2.4 Surveying Windows Forensics: The Windows Registry (7:15)
Start2.5 Surveying Windows Forensics: Hard Drives, FAT, and NTFS (8:17)
Start2.6 Surveying Linux Forensics (11:18)
Start2.7 Understanding Evidence Collection (13:48)
Start2.8 Handling Evidence (4:38)
Start2.9 Examining Asset and Threat Actor Attribution (5:24)