Cisco Certified Expert: Cisco Certified CyberOps Professional

Programs Keywords

Cisco Network Systems Professional Advanced

Certifications

Cisco Certified CyberOps Professional

The Cisco Certified Expert: Cisco Certified CyberOps Professional program prepares students to protect, detect, and defend against cybersecurity threats. Students will be guided through cybersecurity operations fundamentals, methods, and automation; learn foundational concepts and their application in real-world scenarios; and obtain the skills needed to meet the increasing demands of the cybersecurity ecosystem, with a focus on intelligent security rather than information security; and gain competency in incident response roles, cloud security, and other active defense security roles.

This course includes preparation for the industry standard certification Cisco Certified CyberOps Professional.

Competency Goals

  • Describe the types of service coverage within a SOC and operational responsibilities associated with each.
  • Compare security operations considerations of cloud platforms.
  • Describe the general methodologies of SOC platforms development, management, and automation.
  • Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections.
  • Describe Zero Trust and associated approaches, as part of asset controls and protections.
  • Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC.
  • Use different types of core security technology platforms for security monitoring, investigation, and response.
  • Describe the DevOps and SecDevOps processes.
  • Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, Comma-Separated Values (CSV).
  • Describe API authentication mechanisms.
  • Analyze the approach and strategies of threat detection, during monitoring, investigation, and response.
  • Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs).
  • Interpret the sequence of events during an attack based on analysis of traffic patterns.
  • Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools).
  • Analyze anomalous user and entity behavior (UEBA).
  • Perform proactive threat hunting following best practices.

Sample Job Titles

Network Administrator, Network Operation Technician, Network Support, Network Support Technician, Network Technician, Computer Support Specialist, Helpdesk Support, Desktop Support, or other similar jobs.

Learning Methodology: Blended

Credential Awarded: Certificate of Completion

Length of Program: 144 Clock Hours (2-4 Months)

Lecture/Lab Hours: 86/58

Maximum Student/Teacher Ratio: 25:1

Withdrawal Fee: $100.00

Prerequisites: Either 1 year relevant work experience, 1 year postsecondary education at an accredited institution in a related field, or 1 industry certification in a related field

Tuition for Program: $7,500.00

Course Materials Fee (nonrefundable): $250.00

Included in Course Materials Fee
Digital Course Content: $50.00
Virtual Labs: $100.00
Practice Tests: $75.00
eBooks: $25.00