CCNA Cybersecurity Operations

Course Duration

65 hours, 9-day training workshop

Delivery

Face to face training or online training

Course Inclusive

Training materials & certificate of completion

Course Description

The course introduces the core security concepts and skills needed to monitor, detect, analyze and respond to cybercrime, cyberespionage, insider threats, advanced persistent threats, regulatory requirements, and other cybersecurity issues facing organizations. It emphasizes the practical application of the skills needed to maintain and ensure security operational readiness of secure networked systems.

ENTRY COMPETENCIES of Participants (Prerequisites)

The learner who wishes to avail of the training must meet the following requirements:

  • Completed the CCNA R&S (Routing and Switching) Training Program

    In case of a full-online delivery here are some additional requirements:
    • Hardware requirements: minimum 8GB RAM, 64bit processor with virtualization capabilities, at least 100GB free disk space for virtual machines.
    • Software requirements: Any document processing application, Latest Oracle VirtualBox 64 Bit. Virtual Images to be downloaded from the NetSpace platform.

Learning Outcomes

  • Understand cybersecurity operations network principles, roles and responsibilities as well as the related technologies, tools, regulations and frameworks available.
  • Apply knowledge and skills to monitor, detect, investigate, analyze and respond to security incidents.
  • Apply for entry-level jobs as Associate Security Analyst and Incident Responder.
  • Take the Cisco Certified CyberOps Certification exam.
  • Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events.
  • Explain the role of the Cybersecurity Operations Analyst in the enterprise.
  • Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
  • Explain the features and characteristics of the Linux Operating System.
  • Analyze the operation of network protocols and services.
  • Explain the operation of the network infrastructure
  • Classify the various types of network attacks.
  • Use network monitoring tools to identify attacks against network protocols and services.
  • Use various methods to prevent malicious access to computer networks, hosts, and data.
  • Explain the impacts of cryptography on network security monitoring.
  • Explain how to investigate endpoint vulnerabilities and attacks.
  • Evaluate network security alerts.
  • Analyze network intrusion data to identify compromised hosts and vulnerabilities.
  • Apply incident response models to manage network security incidents.
    • MAKATI
    • 333 Sen. Gil Puyat Ave., Makati City 1200, Philippines

    • Contact No.
    • +63 2 8891 0713
      +63 2 8751 6482

    • Email Address
    • inquiries@mapua.edu.ph

    • INTRAMUROS
    • 658 Muralla St., Intramuros, Manila 1002, Philippines

    • Contact No.
    • +63 2 8524-5572


    • Email Address
    • ccesc@mapua.edu.ph