What you’ll learn
The Performing CyberOps Using Cisco Security Technologies (CBRCOR) training is designed to guide participants through the fundamentals of cybersecurity operations, methods, and automation. The knowledge acquired in this training is intended to prepare individuals for the role of an Information Security Analyst within a Security Operations Center (SOC) team. The curriculum covers foundational concepts and their practical application in real-world scenarios, emphasizing the use of playbooks in formulating an effective Incident Response (IR).
Participants will also learn how to apply automation for security using cloud platforms and adopt a SecDevOps (Security-Development-Operations) methodology. The training delves into techniques for detecting cyberattacks, analyzing threats, and making informed recommendations to enhance cybersecurity measures.
Completion of this training not only provides valuable skills but also earns participants 40 Continuing Education (CE) credits, contributing towards the recertification process. Additionally, the training prepares individuals for the 350-201 CBRCOR core exam, validating their proficiency in performing cyber operations using Cisco Security Technologies.
What to expect in the exam
350-201 Performing CyberOps Using Cisco Security Technologies (CBRCOR) is a 120-minute exam associated with the Cisco CyberOps Professional Certification. The multiple-choice format tests knowledge of core cybersecurity operations including cybersecurity fundamentals, techniques, policies, processes, and automation. The exam will test for knowledge in the following areas:
Who should enroll
Technology areas
- Cybersecurity
Training overview
Objectives
After taking this training, you should be able to:
- Describe the types of service coverage within a SOC and operational responsibilities associated with each.
- Compare security operations considerations of cloud platforms.
- Describe the general methodologies of SOC platforms development, management, and automation.
- Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections.
- Describe Zero Trust and associated approaches, as part of asset controls and protections.
- Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC.
- Use different types of core security technology platforms for security monitoring, investigation, and response.
- Describe the DevOps and SecDevOps processes.
- Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, Comma-Separated Values (CSV).
- Describe API authentication mechanisms.
- Analyze the approach and strategies of threat detection, during monitoring, investigation, and response.
- Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs).
- Interpret the sequence of events during an attack based on analysis of traffic patterns.
- Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools).
- Analyze anomalous user and entity behavior (UEBA).
- Perform proactive threat hunting following best practices.