CyberOps Associate
Curs CyberOps Associate - Certificat Cisco Netacad
Descopera provocarile securitatii cibernetice alaturi de INFOACADEMY si Cisco Netacad!

Despre cursul CyberOps Associate
La cursul CyberOps inveti despre sistemele de operare Windows si Linux, despre infrastructura retelelor de calculatoare, tipuri de atacuri cibernetice, alerte de securitate si modalitati de raspuns la acestea.
Nu ai experienta in securitate cibernetica? - Ai nimerit unde trebuie! La acest curs, beneficiezi atat de pregatire teoretica, cat si de practica, pentru a deveni analist in securitate. Iti recomandam acest curs daca iti doresti o cariera in domeniul securitatii cibernetice.
La sfarsitul cursului vei fi pregatit sa descoperi si sa neutralizezi amenintarile cibernetice, atat pe sisteme Windows, cat si pe sisteme Linux. Vei dobandi experienta practica prin exercitiile special concepute de instructorii nostri, astfel incat sa poti face fata asteptarilor potentialilor angajatori.
La fiecare doi ani, sau mai rapid, numarul de echipamente conectate la internet se dubleaza! Acest lucru creeaza noi provocari pentru specialistii in securitate cibernetica. Contributia ta la un Internet mai sigur și mai curat este importanta!
Ce vei invata la cursul CyberOps Associate
- cum sa instalezi masini virtuale pentru a crea un mediu sigur pentru implementarea si analizarea amenintarilor de securitate cibernetica
- cum sa explici rolul in companie al analistului de operatiuni in domeniul securitatii informatice
- cum sa explici caracteristicile sistemului de operare Windows necesare in analizele de securitate cibernetic
- cum sa explici caracteristicile sistemului de operare Linux
- cum sa analizezi functionarea protocoalelor si serviciilor de retea
- cum sa explici functionarea infrastructurii de retea
- cum sa clasifici diferitele tipuri de atacuri in retea
- cum sa evaluezi alertele de securitate din retea
- cum sa aplici modele de raspuns la incidente pentru a gestiona incidentele de securitate in retea
Cum se desfasoara cursul CyberOps Associate
Cursurile CyberOps Associate sunt sustinute online de instructori certificati, cu predare in timp real, in limba romana.
O clasă are, in medie, un numar de 15-20 de studenti, pentru o eficienta maxima in relatia profesor-student.
Cursul este structurat in 13 sedinte (13 saptamani), cu exercitii si aplicatii practice, precum si examene si proiecte – toate avand rolul de a te sustine sa castigi experienta in domeniul retelisticii.
Documentatia este disponibila online 24h/24 , in limba engleza, ceea ce iti da posibilitatea sa inveti in ritmul tau oricand, de oriunde, in functie de nevoile tale. Documentatia este insotita de exercitii special concepute de instructorii nostri, pentru a te ajuta sa intelegi mai usor conceptele invatate.
In urma cursului, obtii o Certificare eliberata de Cisco Netacad care dovedeste ca ai absolvit Cursul CyberOps Associate si care atesta cunostintele obtinute.
Cunostintele dobandite la acest curs iti dau posibilitatea sa sustii examenul* pentru certificarea internationala CyberOps Associate.
*Examenul de certificare internationala este independent de parcurgerea cursurilor si se achita direct la centrul de testare autorizat. Costurile sunt egale la orice centru de testare. Pentru a consulta preturile diverselor certificari, poti consulta:
https://www.cisco.com/c/en/us/training-events/training-certifications/exams.html#~cost
http://www.pearsonvue.com/vouchers/pricelist/cisco.asp
Iată ce vei invata in fiecare Capitol:
- Capitolul 1 - The Danger
1.0 - What is CyberOps
1.1 - War Stories
1.2 - Threat Actors
1.3 - Threat Impact
1.4 - The Danger Summary
- Capitolul 2 - Fighters in the War Against Cybercrime
2.0 - Introduction
2.1 - The Modern Security Operations Center
2.2 - Becoming a Defender
2.3 - Fighters in the War Against Cybercrime Summary
- Capitolul 3 - The Windows Operating System
3.0 - Introduction
3.1 - Windows History
3.2 - Windows Architecture and Operations
3.3 - Windows Configuration and Monitoring
3.4 - Windows Security
3.5 - The Windows Operating System Summary
- Capitolul 4 - Linux Overview
4.0 - Introduction
4.1 - Linux Basics
4.2 - Working in the Linux Shell
4.3 - Linux Servers and Clients
4.4 - Basic Server Administration
4.5 - The Linux File System
4.6 - Working with the Linux GUI
4.7 - Working on a Linux Host
4.8 - Linux Basics Summary
- Capitolul 5 - Network Protocols
5.0 - Introduction
5.1 - Network Communications Process
5.2 - Communications Protocols
5.3 - Data Encapsulation
5.4 - Network Protocols Summary
- Capitolul 6 - Ethernet and Internet Protocol (IP)
6.0 - Introduction
6.1 - Ethernet
6.2 - IPv4
6.3 - IP Addressing Basics
6.4 - Types of IPv4 Addresses
6.5 - The Default Gateway
6.6 - IPv6
6.7 - Ethernet and IP Protocol Summary
- Capitolul 7 - Connectivity Verification
7.0 - Introduction
7.1 - ICMP
7.3 - Connectivity Verification Summary
- Capitolul 8 - Address Resolution Protocol
8.0 - Introduction
8.1 - MAC and IP
8.2 - ARP
8.3 - ARP Issues
8.4 - Address Resolution Protocol Summary
- Capitolul 9 - The Transport Layer
9.0 - Introduction
9.1 - Transport Layer Characteristics
9.2 - Transport Layer Session Establishment
9.3 - Transport Layer Reliability
9.4 - The Transport Layer Summary
- Capitolul 10 - Network Services
10.0 - Introduction
10.1 - DHCP
10.2 - DNS
10.3 - NAT
10.4 - File Transfer and Sharing Services
10.5 - Email
10.6 - HTTP
10.7 - Network Services Summary
- Capitolul 11 - Network Communication Devices
11.0 - Introduction
11.1 - Network Devices
11.2 - Wireless Communications
11.3 - Network Communication Devices Summary
- Capitolul 12 - Network Security Infrastructure
12.0 - Introduction
12.1 - Network Topologies
12.2 - Security Devices
12.3 - Security Services
12.4 - Network Security Infrastructure Summary
- Capitolul 13 - Attackers and Their Tools
13.0 - Introduction
13.1 - Who is Attacking Our Network?
13.2 - Threat Actor Tools
13.3 - Attackers and Their Tools Summary
- Capitolul 14 - Common Threats and Attacks
14.0 - Introduction
14.1 - Malware
14.2 - Common Network Attacks - Reconnaissance, Access, and Social Engineering
14.3 - Network Attacks - Denial of Service, Buffer Overflows, and Evasion
14.4 - Common Threats and Attacks Summary
- Capitolul 15 - Network Monitoring and Tools
15.0 - Introduction
15.1 - Introduction to Network Monitoring
15.2 - Introduction to Network Monitoring Tools
15.3 - Network Monitoring and Tools Summary
- Capitolul 16 - Attacking the Foundation
16.0 - Introduction
16.1 - IP PDU Details
16.2 - IP Vulnerabilities
16.3 - TCP and UDP Vulnerabilities
16.4 - Attacking the Foundation Summary
- Capitolul 17 - Attacking What We Do
17.0 - Introduction
17.1 - IP Services
17.2 - Enterprise Services
17.3 - Attacking What We Do Summary
- Capitolul 18 - Understanding Defense
18.0 - Introduction
18.1 - Defense-in-Depth
18.2 - Security Policies, Regulations, and Standards
18.3 - Understanding Defense Summary
- Capitolul 19 - Access Control
19.0 - Introduction
19.1 - Access Control Concepts
19.2 - AAA Usage and Operation
19.3 - Access Control Summary
- Capitolul 20 - Threat Intelligence
20.0 - Introduction
20.1 - Information Sources
20.2 - Threat Intelligence Services
20.3 - Threat Intelligence Summary
- Capitolul 21 - Cryptography
21.0 - Introduction
21.1 - Integrity and Authenticity
21.2 - Confidentiality
21.3 - Public Key Cryptography
21.4 - Authorities and the PKI Trust System
21.5 - Applications and Impacts of Cryptography
21.6 - Cryptography Summary
- Capitolul 22 - Endpoint Protection
22.0 - Introduction
22.1 - Antimalware Protection
22.2 - Host-Based Intrusion Prevention
22.3 - Application Security
22.4 - Endpoint Protection Summary
- Capitolul 23 - Endpoint Vulnerability Assessment
23.0 - Introduction
23.1 - Network and Server Profiling
23.2 - Common Vulnerability Scoring System (CVSS)
23.3 - Secure Device Management
23.4 - Information Security Management Systems
23.5 - Endpoint Vulnerability Assessment Summary
- Capitolul 24 - Technologies and Protocols
24.0 - Introduction
24.1 - Monitoring Common Protocols
24.2 - Security Technologies
24.3 - Technologies and Protocols Summary
- Capitolul 25 - Network Security Data
25.0 - Introduction
25.1 - Types of Security Data
25.2 - End Device Logs
25.3 - Network Logs
25.4 - Network Security Data Summary
- Capitolul 26 - Evaluating Alerts
26.0 - Introduction
26.1 - Sources of Alerts
26.2 - Overview of Alert Evaluation
26.3 - Evaluating Alerts Summary
- Capitolul 27 - Working with Network Security Data
27.0 - Introduction
27.1 - A Common Data Platform
27.2 - Investigating Network Data
27.3 - Enhancing the Work of the Cybersecurity Analyst
27.4 - Working with Network Security Data Summary
- Capitolul 28 - Digital Forensics and Incident Analysis<
Cerinte preliminare
Pentru cursul CyberOps Associate sunt necesare urmatoarele:
- Cursul de CCNA 1 absolvit sau care urmeaza sa fie absolvit in curand
- cunostinte solide despre utilizarea si functionarea computerului
- cunostinte solide despre sistemul de operare Windows
- cunostine minime despre linux si masini virtuale constituie un avantaj
- abilitati de navigare pe Internet
- limba engleza la nivel mediu.
Tehnic, este recomandat un calculator cu procesor minim i5 8GB RAM, quad core.
Cursuri Recomandate
Alti cursanti au fost interesati si de urmatoarele





