Companies Home Search Profile

Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts

Focused View

Lisa Bock

2:22:40

0 View
  • 001 Defending the network.mp4
    01:12
  • 002 Prepare for Cisco CBROPS exam.mp4
    00:54
  • 003 Setting up your test environment.mp4
    02:04
  • 001 Recognizing todays threats.mp4
    01:07
  • 002 Understanding the threat actor.mp4
    03:37
  • 003 Outlining the CIA triad.mp4
    04:10
  • 004 Having zero trust.mp4
    03:40
  • 005 Exploring risk.mp4
    02:01
  • 006 Analyzing risk.mp4
    02:43
  • 007 Challenge Overview of malware.mp4
    01:16
  • 008 Solution Overview of malware.mp4
    04:12
  • 001 Using the CVSS.mp4
    04:18
  • 002 Interpreting CVSS metric groups.mp4
    03:53
  • 003 Understanding the CVE and the NVD.mp4
    03:36
  • 004 Challenge Temporal metric group.mp4
    01:36
  • 005 Solution Temporal metric group.mp4
    03:01
  • 001 Using the principle of least privilege.mp4
    03:10
  • 002 Defining access control.mp4
    03:33
  • 003 Comparing access control models.mp4
    05:19
  • 004 Summarizing triple-A security.mp4
    03:19
  • 005 Verifying authentication.mp4
    01:57
  • 006 Granting authorization.mp4
    02:40
  • 007 Accounting and logging activity.mp4
    03:42
  • 008 Challenge Network diagram.mp4
    00:54
  • 009 Solution Network diagram.mp4
    04:39
  • 001 Recognizing the complexity of todays environment.mp4
    03:46
  • 002 Leveraging threat intelligence.mp4
    05:14
  • 003 Hunting threats.mp4
    04:23
  • 004 Analyzing malware.mp4
    02:35
  • 005 Dissecting malware using reverse engineering.mp4
    06:40
  • 006 Detecting anomalies using the sliding window.mp4
    04:50
  • 007 Comparing detection methods.mp4
    04:10
  • 008 Using five-tuple log analysis.mp4
    04:48
  • 009 Monitoring data loss using traffic profiles.mp4
    04:24
  • 001 Identifying challenges of data visibility.mp4
    02:25
  • 002 Comparing security deployments.mp4
    02:37
  • 003 Using agentless or agent-based methods.mp4
    02:54
  • 004 Utilizing SIEM SOAR and log management.mp4
    03:13
  • 005 Employing runbook automation.mp4
    03:53
  • 006 Exploring Nmap.mp4
    04:12
  • 007 Challenge Using Nmap.mp4
    02:57
  • 008 Solution Using Nmap.mp4
    05:29
  • 001 Next steps.mp4
    01:37
  • Description


    In this course, instructor Lisa Bock helps you prepare for the Cisco CBROPS exam. Lisa covers the principles of a defense-in-depth strategy, to ensure the confidentiality, availability, and integrity of a system. Lisa outlines today’s threats and threat actors, and explores the relationship between risk, threat, vulnerability, and exploit. She helps you understand the metrics that make up the Common Vulnerability Scoring System. She reviews access control models and stresses the importance of employing the principle of least privilege. Lisa covers the challenges of complex environments in monitoring traffic and describes how using SIEM, SOAR, and log management helps consolidate information. She summarizes security deployments, such as network and endpoint systems. Lisa compares anti-malware applications, outlines the benefits of using threat intelligence, and concludes by describing methods you can use to manage risks and prevent data loss.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Experienced author with a demonstrated history of working in the e-learning industry. She is a security ambassador with a broad range of IT skills and knowledge, including networking, CyberOps, Wireshark, biometrics, Ethical Hacking and the IoT. Lisa is an author for LinkedIn Learning, Packt Publishing and CompTIA and is an award-winning speaker who has presented at several national conferences. She holds a MS in computer information systems/information assurance from UMGC. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, PA) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband Mike enjoy bike riding, watching movies, and traveling.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 43
    • duration 2:22:40
    • Release Date 2024/09/20

    Courses related to Cisco CCNA

    Courses related to Cisco

    Courses related to Cyber Security

    Courses related to Cyber Security Awareness

    Courses related to Cisco CCNP