CCNA Cyber Ops 210-255 (SECOPS) – Matt Carey

We join Groupbuy AND always try to share knowledge with more people. Especially the quality is the same as salepage. You can buy directly at salepage, with full price. (link SALEPAGE are mounted directly on the post)

CCNA Cyber Ops 210-255 (SECOPS) - Matt CareyCCNA Cyber Ops 210-255 (SECOPS) – Matt Carey


Lifetime support – Download unlimited when you buy CCNA Cyber Ops 210-255 (SECOPS) – Matt Carey Course at [GB]esy. The market leader in online learning – Offers a variety of diverse topics: Internet Marketing, Forex & Trading, NLP & Hypnosis, SEO – Traffic, …

This course will teach you how to pass the second of the two required exams to achieve the associate-level CCNA Cyber Ops certification.The SECOPS course improves a candidate’s knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a SOC.

CCNA Cyber Ops 210-255 (SECOPS) - Matt Carey

Master the CCNA CyberOps 210-255 (SECOPS) exam topics

  • Endpoint Threat Analysis and Computer Forensics
  • Network Intrusion Analysis
  • Incident Response
  • Data and Event Analysis
  • Incident Handling

Course Curriculum

Cisco CCNA Cyber Ops 210-255 (SECOPS)

  • Introduction (0:34)

Endpoint Threat Analysis and Computer Forensics

  • Malware Analysis Tool Report (2:26)
  • CVSS 3.0 (6:33)
  • Microsoft Windows File System (4:00)
  • Linux File System (2:04)
  • Evidence and Attribution (2:26)

Network Intrusion Analysis

  • Common Artifact Elements and Protocol Headers (2:14)
  • Security Analysis with Wireshark (2:39)
  • NetFlow v5 and Security Events (0:22)
  • Map Events to Source Technologies (1:58)
  • True or False? (1:56)
  • Impact Flags with the Firepower Management Center (FMC) (1:13)
  • Interpret Basic Regular Expressions (6:23)

Incident Response

  • NIST.SP800-61 r2 (4:56)
  • CSIRT (2:31)
  • Network Profiling (9:28)
  • Server Profiling (4:38)
  • PCI (2:18)
  • HIPAA (1:50)
  • SOX (1:25)

Data and Event Analysis

  • Data Normalization (1:53)
  • Interpret Common Data Values (1:37)
  • 5-tuple (2:20)
  • Retrospective Analysis (1:52)
  • Threat Analysis (4:18)
  • Correlation Rules (5:13)
  • Deterministic and Probabilistic Analysis

Incident Handling

  • Cyber Kill Chain Model (3:19)
Original Content
Back to Top