<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="22902" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/cisco-cbrops" lastchanged="2026-03-19T10:31:59+01:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Understanding Cisco Cybersecurity Operations Fundamentals</title><productcode>CBROPS</productcode><vendorcode>CI</vendorcode><vendorname>Cisco</vendorname><fullproductcode>CI-CBROPS</fullproductcode><version>1.2</version><objective>&lt;p&gt;After taking this training, you should be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Explain how a SOC operates and describe the different types of services that are performed from a Tier 1 SOC analyst&amp;rsquo;s perspective&lt;/li&gt;&lt;li&gt;Explain the use of SOC metrics to measure the effectiveness of the SOC&lt;/li&gt;&lt;li&gt;Explain the use of a workflow management system and automation to improve the effectiveness of the SOC&lt;/li&gt;&lt;li&gt;Describe the Windows operating system features and functionality&lt;/li&gt;&lt;li&gt;Provide an overview of the Linux operating system&lt;/li&gt;&lt;li&gt;Understand common endpoint security technologies&lt;/li&gt;&lt;li&gt;Explain the network security monitoring (NSM) tools that are available to the network security analyst&lt;/li&gt;&lt;li&gt;Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts&lt;/li&gt;&lt;li&gt;Explain the data that is available to the network security analyst&lt;/li&gt;&lt;li&gt;Describe the basic concepts and uses of cryptography&lt;/li&gt;&lt;li&gt;Understand the foundational cloud security practices, including deployment and service models, shared responsibilities, compliance frameworks, and identity and access management, to effectively secure cloud environments against cyberthreats&lt;/li&gt;&lt;li&gt;Understand and implement advanced network security, data protection, secure application deployment, continuous monitoring, and effective disaster recovery strategies to secure cloud deployments&lt;/li&gt;&lt;li&gt;Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors&lt;/li&gt;&lt;li&gt;Identify the common attack vectors&lt;/li&gt;&lt;li&gt;Identify malicious activities&lt;/li&gt;&lt;li&gt;Identify patterns of suspicious behaviors&lt;/li&gt;&lt;li&gt;Identify resources for hunting cyber threats&lt;/li&gt;&lt;li&gt;Explain the need for event data normalization and event correlation&lt;/li&gt;&lt;li&gt;Conduct security incident investigations&lt;/li&gt;&lt;li&gt;Explain the use of a typical playbook in the SOC&lt;/li&gt;&lt;li&gt;Describe a typical incident response plan and the functions of a typical computer security incident response team (CSIRT)&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;Before taking this training, you should have the following knowledge and skills:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Familiarity with Ethernet and TCP/IP networking&lt;/li&gt;&lt;li&gt;Working knowledge of the Windows and Linux operating systems&lt;/li&gt;&lt;li&gt;Familiarity with basics of networking security concepts&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The following Cisco course can help you gain the knowledge you need to prepare for this course:&lt;/p&gt;
&lt;p&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/cisco-ccna&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Implementing and Administering Cisco Solutions &lt;span class=&quot;fl-prod-pcode&quot;&gt;(CCNA)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;</essentials><audience>&lt;p&gt;This training is designed for individuals seeking a role as an associate-level cybersecurity analyst and IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Students pursuing a technical degree&lt;/li&gt;&lt;li&gt;Current IT professionals&lt;/li&gt;&lt;li&gt;Recent college graduates with a technical degree&lt;/li&gt;&lt;/ul&gt;</audience><outline>&lt;ul&gt;
&lt;li&gt;Defining the Security Operations Center&lt;/li&gt;&lt;li&gt;Understanding SOC Metrics&lt;/li&gt;&lt;li&gt;Understanding SOC Workflow and Automation&lt;/li&gt;&lt;li&gt;Understanding Windows Operating System Basics&lt;/li&gt;&lt;li&gt;Understanding Linux Operating System Basics&lt;/li&gt;&lt;li&gt;Understanding Endpoint Security Technologies&lt;/li&gt;&lt;li&gt;Understanding Network Infrastructure and Network Security Monitoring Tools&lt;/li&gt;&lt;li&gt;Understanding Common TCP/IP Attacks&lt;/li&gt;&lt;li&gt;Exploring Data Type Categories&lt;/li&gt;&lt;li&gt;Understanding Basic Cryptography Concepts&lt;/li&gt;&lt;li&gt;Cloud Security Fundamentals&lt;/li&gt;&lt;li&gt;Securing Cloud Deployments&lt;/li&gt;&lt;li&gt;Understanding Incident Analysis in a Threat-Centric SOC&lt;/li&gt;&lt;li&gt;Identifying Common Attack Vectors&lt;/li&gt;&lt;li&gt;Identifying Malicious Activity&lt;/li&gt;&lt;li&gt;Identifying Patterns of Suspicious Behavior&lt;/li&gt;&lt;li&gt;Identifying Resources for Hunting Cyber Threats&lt;/li&gt;&lt;li&gt;Understanding Event Correlation and Normalization&lt;/li&gt;&lt;li&gt;Conducting Security Incident Investigations&lt;/li&gt;&lt;li&gt;Using a Playbook Model to Organize Security Monitoring&lt;/li&gt;&lt;li&gt;Describing Incident Respons&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
e&lt;/p&gt;</outline><objective_plain>After taking this training, you should be able to:


- Explain how a SOC operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective
- Explain the use of SOC metrics to measure the effectiveness of the SOC
- Explain the use of a workflow management system and automation to improve the effectiveness of the SOC
- Describe the Windows operating system features and functionality
- Provide an overview of the Linux operating system
- Understand common endpoint security technologies
- Explain the network security monitoring (NSM) tools that are available to the network security analyst
- Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts
- Explain the data that is available to the network security analyst
- Describe the basic concepts and uses of cryptography
- Understand the foundational cloud security practices, including deployment and service models, shared responsibilities, compliance frameworks, and identity and access management, to effectively secure cloud environments against cyberthreats
- Understand and implement advanced network security, data protection, secure application deployment, continuous monitoring, and effective disaster recovery strategies to secure cloud deployments
- Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors
- Identify the common attack vectors
- Identify malicious activities
- Identify patterns of suspicious behaviors
- Identify resources for hunting cyber threats
- Explain the need for event data normalization and event correlation
- Conduct security incident investigations
- Explain the use of a typical playbook in the SOC
- Describe a typical incident response plan and the functions of a typical computer security incident response team (CSIRT)</objective_plain><essentials_plain>Before taking this training, you should have the following knowledge and skills:


- Familiarity with Ethernet and TCP/IP networking
- Working knowledge of the Windows and Linux operating systems
- Familiarity with basics of networking security concepts
The following Cisco course can help you gain the knowledge you need to prepare for this course:

Implementing and Administering Cisco Solutions (CCNA)</essentials_plain><audience_plain>This training is designed for individuals seeking a role as an associate-level cybersecurity analyst and IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including:


- Students pursuing a technical degree
- Current IT professionals
- Recent college graduates with a technical degree</audience_plain><outline_plain>- Defining the Security Operations Center
- Understanding SOC Metrics
- Understanding SOC Workflow and Automation
- Understanding Windows Operating System Basics
- Understanding Linux Operating System Basics
- Understanding Endpoint Security Technologies
- Understanding Network Infrastructure and Network Security Monitoring Tools
- Understanding Common TCP/IP Attacks
- Exploring Data Type Categories
- Understanding Basic Cryptography Concepts
- Cloud Security Fundamentals
- Securing Cloud Deployments
- Understanding Incident Analysis in a Threat-Centric SOC
- Identifying Common Attack Vectors
- Identifying Malicious Activity
- Identifying Patterns of Suspicious Behavior
- Identifying Resources for Hunting Cyber Threats
- Understanding Event Correlation and Normalization
- Conducting Security Incident Investigations
- Using a Playbook Model to Organize Security Monitoring
- Describing Incident Respons

e</outline_plain><duration unit="d" days="5">5 days</duration><pricelist><price country="PL" currency="EUR">2950.00</price><price country="P3" currency="USD">3495.00</price><price country="CR" currency="USD">3495.00</price><price country="PA" currency="USD">3495.00</price><price country="CL" currency="USD">3495.00</price><price country="AR" currency="USD">3495.00</price><price country="CO" currency="USD">3495.00</price><price country="PE" currency="USD">3495.00</price><price country="MX" currency="USD">3495.00</price><price country="BR" currency="USD">3495.00</price><price country="IT" currency="EUR">3290.00</price><price country="CH" currency="CHF">4670.00</price><price country="UA" currency="USD">4195.00</price><price country="US" currency="USD">4300.00</price><price country="SI" currency="EUR">2625.00</price><price country="GB" currency="GBP">3305.00</price><price country="IL" currency="ILS">12450.00</price><price country="BE" currency="EUR">3495.00</price><price country="NL" currency="EUR">3495.00</price><price country="GR" currency="EUR">2625.00</price><price country="MK" currency="EUR">2625.00</price><price country="HU" currency="EUR">2625.00</price><price country="FR" currency="EUR">4060.00</price><price country="AU" currency="USD">4300.00</price><price country="SG" currency="USD">3440.00</price><price country="IN" currency="USD">2580.00</price><price country="DE" currency="EUR">3950.00</price><price country="SE" currency="EUR">3950.00</price><price country="RU" currency="RUB">410100.00</price><price country="CA" currency="CAD">5935.00</price><price country="AE" currency="USD">3250.00</price><price country="AT" currency="EUR">3950.00</price></pricelist><miles><milesvalue country="CL" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">35.00</milesvalue><milesvalue country="MX" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">35.00</milesvalue><milesvalue country="GB" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="PL" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="PA" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="AR" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="CR" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="NL" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="AE" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="US" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="P3" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="CO" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="FR" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="S2" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="CA" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="ES" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="SG" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="BR" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="PE" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="IT" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="SI" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="SE" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="IL" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="EG" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="AT" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="UA" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="CH" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue><milesvalue country="DE" vendorcurrency="CLC" vendorcurrencyname="Cisco Learning Credits">43.00</milesvalue></miles></course>