Introduction
Defending the network
()
Prepare for Cisco CBROPS exam
()
Setting up your test environment
()
1. Exploring Security Concepts
Recognizing today’s threats
()
Understanding the threat actor
()
Outlining the CIA triad
()
Having zero trust
()
Exploring risk
()
Analyzing risk
()
Challenge: Overview of malware
()
Solution: Overview of malware
()
2. Assessing Vulnerabilities
Using the CVSS
()
Interpreting CVSS metric groups
()
Understanding the CVE and the NVD
()
Challenge: Temporal metric group
()
Solution: Temporal metric group
()
3. Controlling Access
Using the principle of least privilege
()
Defining access control
()
Comparing access control models
()
Summarizing triple-A security
()
Verifying authentication
()
Granting authorization
()
Accounting and logging activity
()
Challenge: Network diagram
()
Solution: Network diagram
()
4. Understanding the Threats
Recognizing the complexity of today’s environment
()
Leveraging threat intelligence
()
Hunting threats
()
Analyzing malware
()
Dissecting malware using reverse engineering
()
Detecting anomalies using the sliding window
()
Comparing detection methods
()
Using five-tuple log analysis
()
Monitoring data loss using traffic profiles
()
5. Managing Risk and Preventing Data Loss
Identifying challenges of data visibility
()
Comparing security deployments
()
Using agentless or agent-based methods
()
Utilizing SIEM, SOAR, and log management
()
Employing runbook automation
()
Exploring Nmap
()
Challenge: Using Nmap
()
Solution: Using Nmap
()
Ex_Files_CyberOps.zip
(194 KB)