Get certified, guaranteed
About our Cisco Certified CyberOps Associate Training Boot Camp
- 90-day extended access to Boot Camp components, including class recordings
- 100% Satisfaction Guarantee
- Exam Pass Guarantee
- Exam voucher
- Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
- Hands-on cyber ranges and labs
- Knowledge Transfer Guarantee
- Onsite proctoring of exam
- Unlimited practice exam attempts

Award-winning training you can trust
What you'll learn
Training overview
There is a growing need for security professionals in the business world. As awareness of security threats grow, businesses of all sizes are beginning to understand the need for increased preparedness against these threats. Our Cisco Certified CyberOps Associate training (previously named CCNA Cyber Ops) is an excellent starting point for those interested in a career in this exciting, challenging and growing field.
This boot camp builds your foundation of cybersecurity knowledge and skills — with the goal of preparing you for the responsibilities of an entry-level security analyst working in a SOC. It also prepares you to validate your new skills by earning your Cisco Certified CyberOps Associate certification.
Before your boot camp
Prerequisites
Prior to enrolling in our authorized Cisco Certified CyberOps Associate Boot Camp, you should have a sound working experience with basic network security and TCP/IP.

Syllabus
Training schedule
Security concepts
- Describe the CIA triad
- Compare security deployments
- Describe security terms
- Compare security concepts
- Describe the principles of the defense-in-depth strategy
- Compare access control models
- Describe terms as defined in CVSS
- Identify the challenges of data visibility (network, host, and cloud) in detection
- Identify potential data loss from provided traffic profiles
- Interpret the 5-tuple approach to isolate a compromised host in a grouped set of logs
- Compare rule-based detection vs. behavioral and statistical detection
Security monitoring
- Compare attack surface and vulnerability
- Identify the types of data provided by these technologies
- Describe the impact of these technologies on data visibility
- Describe the uses of these data types in security monitoring
- Describe network attacks, such as protocol-based, denial of service, distributed denial of service and man-in-the-middle
- Describe web application attacks, such as SQL injection, command injections and crosssite scripting
- Describe social engineering attacks
- Describe endpoint-based attacks, such as buffer overflows, command and control (C2), malware and ransomware
- Describe evasion and obfuscation techniques, such as tunneling, encryption and proxies
- Describe the impact of certificates on security (includes PKI, public/private crossing the network, asymmetric/symmetric)
- Identify the certificate components in a given scenario
- Cipher-suite
Host-based analysis
- Describe the functionality of these endpoint technologies in regard to security monitoring
- Identify components of an operating system (such as Windows and Linux) in a given scenario
- Describe the role of attribution in an investigation
- Identify type of evidence used based on provided logs
- Compare tampered and untampered disk image
- Interpret operating system, application, or command line logs to identify an event
- Interpret the output report of a malware analysis tool (such as a detonation chamber or sandbox)
Network intrusion analysis
- Map the provided events to source technologies
- Compare impact and no impact for these items
- Compare deep packet inspection with packet filtering and stateful firewall operation
- Compare inline traffic interrogation and taps or traffic monitoring
- Compare the characteristics of data obtained from taps or traffic monitoring and transactional data (NetFlow) in the analysis of network traffic
- Extract files from a TCP stream when given a PCAP file and Wireshark
- Identify key elements in an intrusion from a given PCAP file
- Interpret the fields in protocol headers as related to intrusion analysis
- Interpret common artifact elements from an event to identify an alert
- Interpret basic regular expressions
Security policies and procedures
- Describe management concepts
- Describe the elements in an incident response plan as stated in NIST.SP800-61
- Apply the incident handling process (such as NIST.SP800-61) to an event
- Map elements to these steps of analysis based on the NIST.SP800-61
- Map the organization stakeholders against the NIST IR categories (CMMC, NIST.SP800-61)
- Describe concepts as documented in NIST.SP800-86
- Identify these elements used for network profiling
- Identify these elements used for server profiling
- Identify protected data in a network
- Classify intrusion events into categories as defined by security models, such as Cyber Kill Chain Model and Diamond Model of Intrusion
- Describe the relationship of SOC metrics to scope analysis (time to detect, time to contain, time to respond, time to control)
Meets 8570.1 requirements
Attention DoD Information Assurance workers! This boot camp helps meet U.S. Department of Defense Directive 8570.1 requirements for department employees or contractors engaged in work related to information security.
Guaranteed results
Our boot camp guarantees

Exam Pass Guarantee
If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year (does not apply to CMMC-AB boot camps).

100% Satisfaction Guarantee
If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee
If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.
Unlock team training discounts
If you’re like many of our clients, employee certification is more than a goal — it’s a business requirement. Connect with our team to learn more about our training discounts.

Enroll in a boot camp
-
Exam Pass Guarantee
-
Exam Pass Guarantee
-
Exam Pass Guarantee
-
Exam Pass Guarantee
-
Exam Pass Guarantee
Explore our top boot camps
More learning opportunities
-
Most popularBoot camp
CompTIA Security+ Training Boot Camp
Infosec’s CompTIA Security+ Boot Camp teaches you information security theory and reinforces that theory with hands-on exercises to help you learn by doing. You’ll learn how to configure and operate many different technical security controls — and leave prepared to pass your Security+ exam.
Learn More
-
#1 FOR BEGINNERSBoot camp
Cisco CCNA Associate & CyberOps Associate Training Boot Camp with Dual Certification
Infosec’s authorized CCNA Dual Certification Boot Camp helps you build your knowledge of networking and provides hands-on experience installing, configuring and operating network devices — all while preparing you to earn two Cisco certifications.
Learn More
-
Most requestedBoot camp
(ISC)² CISSP® Certification Training and Boot Camp
Take your career to the next level by earning one of the most in-demand cybersecurity certifications. Infosec’s CISSP training provides a proven method for mastering the broad range of knowledge required to become a Certified Information Systems Security Professional.
Learn More