Implementing Cisco Cybersecurity Operations (SECOPS)

Overview

The Implementing Cisco Cybersecurity Operations (SECOPS) training and certification course will give you a detailed overview of how a Security Operations Center (SOC) functions and the introductory-level skills and knowledge needed in this environment. During the training, you will learn basic threat analysis, event correlation, identifying malicious activity, and how to use a playbook for incident response.

Who should do Implementing Cisco Cybersecurity Operations (SECOPS) training?

  • Security Operations Center – Security Analyst
  • Computer/Network Defense Analysts
  • Computer Network Defense Infrastructure Support Personnel
  • Future Incident Responders and Security Operations Center (SOC) personnel
  • Students beginning a career, entering the cybersecurity field
This course prepares you for Exam 300-550 NPDESI. Download Course Contents
Schedule & Prices
Course Details Schedule
Classroom Training*
Duration : 5 Days
Fee : Online : $2,000  (1-on-1), London : £2,500, Dubai : $2,600 , India : $1,800

March
09-13 (Birmingham)
09-13 (London)
09-13 (Manchester)
15-19 (Dubai)
April
13-17 (Birmingham)
13-17 (London)
13-17 (Manchester)
May
11-15 (Birmingham)
11-15 (London)
11-15 (Manchester)
June
08-12 (Birmingham)
08-12 (London)
08-12 (Manchester)
July
19-23 (Dubai)
Instructor-Led Online Training
Duration : 5 Days
Fee :  $2,000


March
09-13
15-19
April
13-17
May
11-15
June
08-12
July
19-23
Fly-Me-a-Trainer
Duration : 5 Days
Fee : On Request
Client's Location
As per mutual convenience

Enquire Now




Input symbols

Course Prerequisites

Recommended, but not required

  • Skills and knowledge equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1)
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts
     


On completion of this course, you will know:

  • Define a SOC and the various job roles in a SOC
  • Understand SOC infrastructure tools and systems
  • Learn basic incident analysis for a threat-centric SOC
  • Explore resources available to assist with an investigation
  • Explain basic event correlation and normalization
  • Describe common attack vectors
  • Learn how to identify malicious activity
  • Understand the concept of a playbook
  • Describe and explain an incident respond handbook
  • Define types of SOC Metrics
  • Understand SOC Workflow Management system and automation
)