FLEXI - SELF PACED TRAINING RE-IMAGINED

Do you Need Live Online Training? Do you not have Time for Live Online? Do you Want to Start Immediately? Koenig's Flexi can help You.

Flexi is a Video Recording of Live Online + Official Courseware + Hands-On-Labs + Qubits Test

Flexi is a Unique Union of Live Online and On-Demand Learning Options.
Live Online
+
On Demand
=
Flexi

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Power Packed 17:00 Hours (Edited from 40 hours of video content) Recorded on 01-Jan-01

Includes 60+ Tests Questions (Qubits42)
Download Course Contents
Module 1: Security Concepts
  • Describe the CIA triad
  • Compare security deployments
  • Describe security terms
  • Compare security concepts
  • Describe the principles of the defense-in-depth strategy
  • Compare access control models
  • Describe terms as defined in CVSS
  • Identify the challenges of data visibility (network, host, and cloud) in detection
  • Identify potential data loss from provided traffic profiles
  • Interpret the 5-tuple approach to isolate a compromised host in a grouped set of logs
  • Compare rule-based detection vs. behavioral and statistical detection
  • Compare attack surface and vulnerability
  • Identify the types of data provided by these technologies
  • Describe the impact of these technologies on data visibility
  • Describe the uses of these data types in security monitoring
  • Describe network attacks, such as protocol-based, denial of service, distributed denial of service, and man-in-the-middle
  • Describe web application attacks, such as SQL injection, command injections, and crosssite scripting
  • Describe social engineering attacks
  • Describe endpoint-based attacks, such as buffer overflows, command and control (C2), malware, and ransomware
  • Describe evasion and obfuscation techniques, such as tunneling, encryption, and proxies
  • Describe the impact of certificates on security (includes PKI, public/private crossing the network, asymmetric/symmetric)
  • Identify the certificate components in a given scenario
  • Describe the functionality of these endpoint technologies in regard to security monitoring
  • Identify components of an operating system (such as Windows and Linux) in a given scenario
  • Describe the role of attribution in an investigation
  • Identify type of evidence used based on provided logs
  • Compare tampered and untampered disk image
  • Interpret operating system, application, or command line logs to identify an event
  • Interpret the output report of a malware analysis tool (such as a detonation chamber or sandbox)
  • Map the provided events to source technologies
  • Compare impact and no impact for these items
  • Compare deep packet inspection with packet filtering and stateful firewall operation
  • Compare inline traffic interrogation and taps or traffic monitoring
  • Compare the characteristics of data obtained from taps or traffic monitoring and transactional data (NetFlow) in the analysis of network traffic
  • Extract files from a TCP stream when given a PCAP file and Wireshark
  • Identify key elements in an intrusion from a given PCAP file
  • Interpret the fields in protocol headers as related to intrusion analysis
  • Interpret common artifact elements from an event to identify an alert
  • Interpret basic regular expressions
  • Describe management concepts
  • Describe the elements in an incident response plan as stated in NIST.SP800-61
  • Apply the incident handling process (such as NIST.SP800-61) to an event
  • Map elements to these steps of analysis based on the NIST.SP800-61
  • Map the organization stakeholders against the NIST IR categories (CMMC, NIST.SP800- 61)
  • Describe concepts as documented in NIST.SP800-86
  • Identify these elements used for network profiling
  • Identify these elements used for server profiling
  • Identify protected data in a network
  • Classify intrusion events into categories as defined by security models, such as Cyber Kill Chain Model and Diamond Model of Intrusion
  • Describe the relationship of SOC metrics to scope analysis (time to detect, time to contain, time to respond, time to control)

You will get access to Flexi instantly.

Flexi Video

USD 99

Official Courseware With Lab1

USD 599

Hands-On-Labs Without Courseware

USD 59

1Delivery lead time is 7 Days

Total

USD 99

100% Secure Transaction

Learn more about Koenig. Download Presentation

FAQ's

Q1. How long do you have access to Flexi after purchase?

A. 3 months from date of delivery.

Q2. Can the content be shared or is it only available for one user?

A. It is only for the self-use of the purchaser.

Q3. Do you have business packages that you offer to companies that would make use of these packages on a regular basis?

A. Yes, contact us for corporate packages.

Q4. What is the pass rate of students that used Flexi as their method of preparation?

A. We do not track the pass rate of Flexi students. We, however suspect that it will be lower than for Live Online.

Q5. If we buy Flexi today, and there are any updates in the course, do we get the updated recordings as well or do we need to repurchase Flexi?

A. If the latest update comes within 3 months after the sale we can give the updated version.

Q6. Can we download the videos or we stream them online?

A. Videos can only be streamed and not downloaded.

Q7. Do you have courses in languages other than English?

A. Presently Flexi is only available in English.

Feedbacks from Clients