Retele - CyberSecurity

Cererea de experți în domeniul cybersecurity a crescut de 3,5 ori.

Mai rapid decât orice alt rol din domeniul IT !

Puneți-vă calitățile de detectiv la lucru acumulând competențe și cunoștințe care vă pot ajuta să găsiți un loc de muncă foarte bine plătit.

Începe chiar de azi lupta împotriva criminalității informatice !

Play Video

Curs CyberSecurity pentru
Noua Certificare Cisco Cyberops Associate

 Cursul actualizat de formare pentru certificare Cisco CyberOps Associate – va poate lansa cariera, aratand angajatorului ca aveti cunostinte si abilitati din lumea reala pentru a preveni, detecta si apara impotriva amenintarilor de securitate cibernetica, ca puteti fi un membru valoros al oricarei echipe SOC (Security Operation Center).

Cursul va pregateste pentru a obtine certificarea  CyberOps Associate si este în concordanța cu materia pentru examenul 200-201 CBROPS (Cybersecurity Operations Fundamentals).

Participarea la curs si promovarea examenelor din cadrul cursului cu un punctaj peste 70 % la examenul final va califica pentru un voucher cu discount de peste 50% la sustinerea examenului in centrele VUE.

Ce vei învăța

Monitorizarea, Detectarea, Investigarea evenimentelor de securitate. Protecția sistemelor la riscuri, amenințări și vulnerabilități de securitate.

Locuri de muncă

Analist SOC (Security Operation Center), Incident Responder, Security Analyst, Vulnerability Analyst, Threat Intelligence Analyst, Security Administrator

Cine te angajează

Instituții publice, companii care asigură prin contracte de mentenanța securitatea rețelelor, SOC (Security Operations Center)

CyberOps Associate - 28 module

Cursul este conceput pentru cei care doresc sa obtina abilități de analist de securitate si să urmeze o carieră în Securitate intr-un Centrul de operațiuni (SOC). Cursanții vor fi expuși la toate cunoștințele de bază necesare pentru a detecta, analizați și escalada amenințările de bază la securitatea cibernetică folosind instrumente open-source (SNORT, Security Onion, ElasticSearch, Kibana, Logstash, nmap, OSSINT, etc.)
Cerințe preliminare:
         • Cunoștințe de navigare pe PC și pe internet
         • Concepte de bază de sistem Windows și Linux
         • Înțelegerea de bază a rețelelor de calculatoare
         • Înțelegerea binară și hexazecimală
         • Familiarizare cu Cisco Packet Tracer ( nu este o cerinta obligatorie)

● Outline features of cybersecurity incidents.
● Explain the motivations of the threat actors behind specific security incidents.
● Explain the potential impact of network security attacks.

● Explain the mission of the security operations center.
● Describe resources available to prepare for a career in cybersecurity operations.

● Explain the architecture of Windows and its operation.

● Explain how Windows can be kept secure.

● Explain how to configure and monitor Windows.

● Explain why Linux skills are essential for network security monitoring
and investigation.
● Use the Linux shell to manipulate text files.
● Explain how a Linux administrator locates and manipulates security log files.
● Manage the Linux file system and permissions.
● Explain the basic components of the Linux GUI.
● Use tools to detect malware on a Linux host.

● Explain the basic operations of data networked communications.
● Explain how protocols enable network operations.communication.
● Explain how data encapsulation allows data to be transported across the network.

● Explain how Ethernet supports network communication.
● Explain how the IPv4 protocol supports network communications.
● Explain how IP addresses enable network communication.
● Explain how the IPv6 protocol supports network communications.

● Explain how ICMP is used to test network connectivity.
● Use Windows tools, ping, and traceroute to verify network connectivity.

● Compare the roles of the MAC address and the IP address.
● Analyze ARP by examining Ethernet frames.
● Explain how ARP requests impact network and host performance.

● Explain how transport layer protocols support network communication.
● Explain how the transport layer establishes communication sessions.
● Explain how the transport layer establishes reliable .communications.

● Explain how DHCP, DNS, NAT, HTTP services enable network functionality.
● Explain how file transfer services enable network functionality.
● Explain how email services enable network functionality

● Explain how network devices enable network communication.
● Explain how wireless devices enable network communication.

● Explain how network designs influence the flow of traffic through the network.
● Explain how specialized devices are used to enhance network security.
● Explain how network services enhance network security.

● Explain how network threats have evolved.
● Describe the various types of attack tools used by Threat Actors.
● A brief summary and the module quiz.

● Describe types of malware.
● Explain reconnaissance, access, and social engineering attacks.
● Explain denial of service, buffer overflow, and evasion attacks.

● Explain the importance of network monitoring.
● Explain how network monitoring is conducted.
● A brief summary and the module quiz.

● Explain the IPv4 and IPv6 header structure.
● Explain how IP vulnerabilities enable network attacks.
● Explain how TCP and UDP vulnerabilities enable network attacks.

● Explain IP service vulnerabilities.
● Explain how network application vulnerabilities enable network attacks.
● A brief summary and the module quiz.

● Explain how the defense-in-depth strategy is used to protect networks.
● Explain security policies, regulations, and standards.
● A brief summary and the module quiz.

● Explain how access control protects network data.
● Explain how AAA is used to control network access.
● A brief summary and the module quiz.

● Describe information sources used to communicate emerging network security threats.
● Describe various threat intelligence services
● A brief summary and the module quiz.

● Explain the role of cryptography in ensuring the integrity and authenticity data.
● Explain how cryptographic approaches enhance data confidentiality.
● Explain public key cryptography.
● Explain how the public key infrastructure functions.
● Explain how the use of cryptography affects cybersecurity operations.

● Explain methods of mitigating malware
● Explain host-based IPS/IDS log entries.
● Explain how sandbox is used to analyze malware.
● A brief summary and the module quiz.

● Explain the value of network and server profiling.
● Explain how CVSS reports are used to describe security vulnerabilities.
● Explain how secure device management techniques are used to protect data and assets.
● Explain how information security management systems are used to protect assets.

● Explain the behavior of common network protocols in the context of security monitoring.
● Explain how security technologies affect the ability to monitor common network protocols.
● A brief summary and the module quiz.

● Describe the types of data used in security monitoring.
● Describe the elements of an end device log file.
● Describe the elements of a network device log file.

● Identify the structure of alerts.
● Explain how alerts are classified.
● A brief summary and the module quiz.

● Explain how data is prepared for use in Network Security Monitoring (NSM) system.
● Use Security Onion tools to investigate network security events.
● Describe network monitoring tools that enhance workflow management.

● Explain the role of digital forensic processes.
● Identify the steps in the Cyber Kill Chain.
● Classify an intrusion event using the Diamond Model.
● Apply the NIST 800-61r2 incident handling procedures to a given incident scenario.

Certification preparation, discount vouchers, and other careercresources.

Trimite-ne mesajul tău și îți răspundem în cel mai scurt timp

Scroll to Top
WhatsApp Întreabă pe WhatsApp !