CBROPS: Security Events, Firewall Operations, & Traffic Analysis
Cisco CBROPS
| Intermediate
- 4 videos | 1h 12m 14s
- Includes Assessment
- Earns a Badge
In this course, you'll learn to categorize intrusion events according to the cyber kill chain and diamond intrusion models. Next, with so many tools available, you'll examine which ones should be used to identify different security events. You'll learn the differences between deep packet inspection, packet filtering, and stateful firewall operations. Finally, you'll review the differences between inline traffic interrogation, taps, and traffic monitoring. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
WHAT YOU WILL LEARN
-
Recognize the phase of the cyber kill chain that may involve a phishing attackdetermine infrastructure elements that are used during the diamon model of intrusionidentify the phases of the cyber kill chain modelIdentify key information being monitored with network application controlidentify the types of events that occur during network intrusion analysisrecognize traffic patterns being monitored in a virtualization environment
-
Recognize the firewall type that only inspects the header of the packetidentify the layer of the osi model that a dpi firewall runs atRecognize features of a cisco switch that allows you to monitor network trafficidentify the different methods to perform inline traffic interrogationidentify monitoring features that can be configured on a cisco device to monitor specific traffic
IN THIS COURSE
-
20m 25s
-
20m 43s
-
12m 26s
-
18m 40s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.