Cisco CyberOps Associate CBROPS 200-201: Part 1 Course
4.5 (409 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,255 students enrolled

Cisco CyberOps Associate CBROPS 200-201: Part 1 Course

Learn Cyber Security and prepare for your Cisco CyberOps (CBROPS) certification exam. Kali Linux tutorial included!
4.5 (409 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,255 students enrolled
Created by Matt Carey
Last updated 7/2020
English
Current price: $13.99 Original price: $19.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 3.5 hours on-demand video
  • 3 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • How to pass the Cisco CyberOps Associate CBROPS 200-201 exam
  • How to use the Kali hacking tools
  • How to become a cyber security specialist
Requirements
  • A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.
Description

This course will help you prepare for the CBROPS 200-201 exam. You will gain an understanding of cyber-security's basic principles, foundation knowledge, and core skills needed to grasp the more advanced associate-level materials.

The United States Department of Defense (DoD) has approved the Cisco Cyber Ops  Associate Certification for the DoD 8570.01-M for the CSSP Analyst and CCSP Incident Responder categories.

CBROPS 200-201 exam topics covered in this course:

  • Security concepts

  • Security monitoring

  • Host-based analysis

As an added bonus you will also learn how to use the hacking tools software Kali Linux!

  • Golismero

  • Nmap

  • Metasploit

  • Armitage

Practice Exam Questions Included!

Who this course is for:
  • For anyone who would love to gain a practical skillset in mitigating the risk from, malware, Trojans, hackers, tracker, cyber criminals and all online threats.
  • For anyone studying for the Cisco CyberOps Associate CBROPS 200-201 certification exam.
Course content
Expand all 52 lectures 03:34:25
+ Network Concepts
10 lectures 42:59
Network Fundamentals
09:42
Network Protocols - ICMP
04:06
Network Protocols - ARP
02:55
Network Protocols - DHCP
04:01
Network Protocols - DNS
02:56
Network Devices
04:48
Firewalls
02:49
IPS & AMP
08:38
Email & Web Security
01:18
Inline Traffic Interrogation, Taps & NetFlow
01:46
Network Concepts
7 questions
+ Security Concepts
15 lectures 51:50
CIA Triad
00:59
Defense in Depth Strategy
00:57
Exploits
07:19
Risks
01:17
Security Terms
04:06
Access Control Models
01:36
Threat Hunting
01:05
Zero Trust
01:41
Threat intelligence platform (TIP)
01:59
Authentication, Authorization, and Accounting
12:01
Rule-based, Time-based & Role-based Access Control
01:05
CVSS 3.0
06:33
5-tuple
02:20
Rule-based detection vs. Behavioral and Statistical detection
02:58
Security Concepts
4 questions
+ Security Monitoring
14 lectures 01:03:30
Attack Surface Analysis
01:16
Network Attacks
06:36
Web Application Attacks
02:16
Endpoint-Based Attacks
05:41
Social Engineering and Phishing Attacks
05:07
Evasion Methods
06:55
Network Logging
05:14
Packet Captures
06:23
NetFlow
02:54
Application Visibility and Control (AVC)
01:15
Monitoring Challenges
04:02
NextGen IPS Event Types
01:29
Encryption and Hashing
02:39
PKI
11:43
Security Monitoring
3 questions
+ Host-Based Analysis
11 lectures 46:14
Microsoft Windows - Introduction
05:31
Microsoft Windows - Terms
08:40
Linux - Introduction
02:37
Linux - Terms
08:54
Endpoint Protection
02:07
Whitelisting and Blacklisting
04:27
Systems-Based Sandboxing
03:26
System Logs
03:55
Malware Analysis Tool Report
02:26
Indicators of Compromise and Attack
01:45
Evidence and Attribution
02:26
Host-Based Analysis
5 questions