Cisco CyberOps Associate CBROPS (200-201)
(200-201.AP1)
/ ISBN: 978-1-64459-264-9
This course includes
Lessons
TestPrep
LiveLab
Mentoring (Add-on)
Cisco CyberOps Associate CBROPS (200-201)
Get certified for the Cisco Certified CyberOps Associate exam with the Cisco CyberOps CBROPS Associate creation (200-201) course and lab. The course and lab cover the 200-201 CBROPS exam objectives and teach you about the concepts such as network, endpoint, and application security systems, agentless and agent-based protection, legacy antivirus, and anti-malware, and more. The study guide is equipped with various comprehensive learning resources to help in understanding security monitoring challenges in the SOC and additional evasion and obfuscation techniques.
The Cisco Certified CyberOps Associate certification helps in starting a cybersecurity operations career. Candidates need to pass the 200-201 CRBOPS exam that covers the principles of cybersecurity operations, skills, and procedures to receive the CyberOps Associate certification. The 200-210 CRBOPS certification exam certifies a candidate's skills of working with security principles, security monitoring, host-based analysis, network intrusion analysis, and security policies and procedures.
Lessons
-
16+ Lessons
-
210+ Quizzes
-
172+ Flashcards
-
172+ Glossary of terms
TestPrep
-
90+ Pre Assessment Questions
-
2+ Full Length Tests
-
90+ Post Assessment Questions
-
180+ Practice Test Questions
LiveLab
-
45+ LiveLab
-
52+ Video tutorials
-
01:47+ Hours
- The Cisco CyberOps Associate Certification
- The Exam Objectives (Domains)
- Steps to Pass the 200-201 CBROPS Exam
- Signing Up for the Exam
- Facts About the Exam
- About the Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
- Introduction to Cybersecurity
- Threats, Vulnerabilities, and Exploits
- Network Security Systems
- Intrusion Detection Systems and Intrusion Prevention Systems
- Advanced Malware Protection
- Web Security Appliance
- Email Security Appliance
- Cisco Security Management Appliance
- Cisco Identity Services Engine
- Security Cloud-Based Solutions
- Cisco NetFlow
- Data Loss Prevention
- The Principles of the Defense-in-Depth Strategy
- Confidentiality, Integrity, and Availability: The CIA Triad
- Risk and Risk Analysis
- Personally Identifiable Information and Protected Health Information
- Principle of Least Privilege and Separation of Duties
- Security Operations Centers
- Playbooks, Runbooks, and Runbook Automation
- Digital Forensics
- Review All Key Topics
- Review Questions
- Cloud Computing and the Cloud Service Models
- Cloud Security Responsibility Models
- DevOps, Continuous Integration (CI), Continuous Delivery (CD), and DevSecOps
- Understanding the Different Cloud Security Threats
- Review All Key Topics
- Review Questions
- Information Security Principles
- Subject and Object Definition
- Access Control Fundamentals
- Access Control Process
- Information Security Roles and Responsibilities
- Access Control Types
- Access Control Models
- Access Control Mechanisms
- Identity and Access Control Implementation
- Review All Key Topics
- Review Questions
- Types of Attacks
- Types of Vulnerabilities
- Review All Key Topics
- Review Questions
- Cryptography
- Block and Stream Ciphers
- Symmetric and Asymmetric Algorithms
- Hashes
- Digital Signatures
- Next-Generation Encryption Protocols
- IPsec and SSL/TLS
- Fundamentals of PKI
- Root and Identity Certificates
- Revoking Digital Certificates
- Using Digital Certificates
- Review All Key Topics
- Review Questions
- What Are VPNs?
- Site-to-Site vs. Remote-Access VPNs
- An Overview of IPsec
- SSL VPNs
- Review All Key Topics
- Review Questions
- Introduction to Identity and Access Management
- Security Events and Log Management
- Asset Management
- Introduction to Enterprise Mobility Management
- Configuration and Change Management
- Vulnerability Management
- Patch Management
- Review All Key Topics
- Review Questions
- Introduction to Incident Response
- The Incident Response Plan
- The Incident Response Process
- Information Sharing and Coordination
- Incident Response Team Structure
- Common Artifact Elements and Sources of Security Events
- Understanding Regular Expressions
- Protocols, Protocol Headers, and Intrusion Analysis
- How to Map Security Event Types to Source Technologies
- Review All Key Topics
- Review Questions
- Introduction to Digital Forensics
- The Role of Attribution in a Cybersecurity Investigation
- The Use of Digital Evidence
- Evidentiary Chain of Custody
- Reverse Engineering
- Fundamentals of Microsoft Windows Forensics
- Fundamentals of Linux Forensics
- Review All Key Topics
- Review Questions
- Network Infrastructure Logs
- Traditional Firewall Logs
- NetFlow Analysis
- Network Packet Capture
- Network Profiling
- Review All Key Topics
- Review Questions
- Understanding Host Telemetry
- Host Profiling
- Analyzing Windows Endpoints
- Linux and macOS Analysis
- Endpoint Security Technologies
- Review All Key Topics
- Review Questions
- Security Monitoring Challenges in the SOC
- Additional Evasion and Obfuscation Techniques
- Review All Key Topics
- Review Questions
- Normalizing Data
- Using the 5-Tuple Correlation to Respond to Security Incidents
- Using Retrospective Analysis and Identifying Malicious Files
- Mapping Threat Intelligence with DNS and Other Artifacts
- Using Deterministic Versus Probabilistic Analysis
- Review All Key Topics
- Review Questions
- Diamond Model of Intrusion
- Cyber Kill Chain Model
- The Kill Chain vs. MITRE’s ATT&CK
- Review All Key Topics
- Review Questions
- What Is Threat Hunting?
- The Threat-Hunting Process
- Threat Hunting and MITRE’s ATT&CK
- Threat-Hunting Case Study
- Threat Hunting, Honeypots, Honeynets, and Active Defense
- Review All Key Topics
- Review Questions
Hands on Activities (Live Labs)
- Exploiting Command Injection Vulnerabilities
- Using Rainbow Tables
- Consulting a Vulnerability Database
- Configuring Dynamic NAT
- Creating and Applying a Numbered Standard ACL
- Creating and Applying a Numbered Extended ACL
- Simulating a DoS Attack
- Installing Antivirus Software
- Enabling AAA Services and Working with Method Lists
- Implementing Port Security
- Configuring a BPDU Guard on a Switch Port
- Using Maltego
- Using Shodan
- Using Nikto
- Using Social Engineering Techniques to Plan an Attack
- Simulating the DDoS Attack
- Using Ettercap for ARP Spoofing
- Cracking a Linux Password Using John the Ripper
- Performing Active Reconnaissance
- Performing a Memory-Based Attack
- Performing a MITM Attack
- Defending Against a Buffer Overflow Attack
- Using PGP
- Generating a Symmetric Key
- Generating an Asymmetric Key
- Applying Symmetric Key Encryption
- Observing an MD5-Generated Hash Value
- Observing an SHA-Generated Hash Value
- Implementing IPsec VPNs through CLI
- Configuring an SSL Cisco AnyConnect Secure Mobility Client VPN
- Configuring Clientless SSL VPNs on ASA
- Viewing Event Logs
- Using Reverse Engineering
- Changing the Startup Type of Service
- Viewing the Windows File Registry
- Managing NTFS Permissions
- Using Linux Commands
- Configuring the Router to Use NTP Services
- Simulating an Eavesdropping Attack Using Wireshark
- Configuring NetFlow and NetFlow Data Export
- Showing Logging in to a System
- Identifying Listening Ports on the Network
- Using Windows Event Viewer
- Changing File Permissions
- Using a Symlink
- Setting Up a Honeypot
What are the prerequisites for this exam? | There are no formal prerequisites for CyberOps Associate certification exam. |
---|---|
What is the exam registration fee? | USD 300 |
Where do I take the exam? | Pearson VUE |
What is the format of the exam? | Fill in the blanks, drag and drop, multiple-choice single answer, ,multiple-choice multiple answer |
How many questions are asked in the exam? | The exam contains 95-105 questions. |
What is the duration of the exam? | 120 minutes |
What is the passing score? | Cisco does not publish exam passing scores because exam questions and passing scores are subject to change without notice. |
What is the exam's retake policy? | The policies for retaking exams are as follows:
|
What is the validity of the certification? | Three years |
Where can I find more information about this exam? | Know more about the 200-201 |
What are the career opportunities after passing this exam? |
|
×