Boot Camp

Cisco Certified CyberOps Associate Training Boot Camp

Infosec’s authorized Cisco Certified CyberOps Associate Boot Camp is an intense two-day training designed to build a foundation of skills around cybersecurity operations. You will acquire the skills necessary to begin a career working with associate-level cybersecurity analysts within a security operations center (SOC).

Get certified, guaranteed

About our Cisco Certified CyberOps Associate Training Boot Camp

  • 90-day extended access to Boot Camp components, including class recordings
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee
  • Exam voucher
  • Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
  • Hands-on cyber ranges and labs
  • Knowledge Transfer Guarantee
  • Onsite proctoring of exam
  • Unlimited practice exam attempts

Award-winning training you can trust

Wistia video thumbnail

What you'll learn

Training overview

There is a growing need for security professionals in the business world. As awareness of security threats grow, businesses of all sizes are beginning to understand the need for increased preparedness against these threats. Our Cisco Certified CyberOps Associate training (previously named CCNA Cyber Ops) is an excellent starting point for those interested in a career in this exciting, challenging and growing field.

This boot camp builds your foundation of cybersecurity knowledge and skills — with the goal of preparing you for the responsibilities of an entry-level security analyst working in a SOC. It also prepares you to validate your new skills by earning your Cisco Certified CyberOps Associate certification.

Before your boot camp

Prerequisites

Prior to enrolling in our authorized Cisco Certified CyberOps Associate Boot Camp, you should have a sound working experience with basic network security and TCP/IP.

Syllabus

Training schedule

Security concepts
  • Describe the CIA triad
  • Compare security deployments
  • Describe security terms
  • Compare security concepts
  • Describe the principles of the defense-in-depth strategy
  • Compare access control models
  • Describe terms as defined in CVSS
  • Identify the challenges of data visibility (network, host, and cloud) in detection
  • Identify potential data loss from provided traffic profiles
  • Interpret the 5-tuple approach to isolate a compromised host in a grouped set of logs
  • Compare rule-based detection vs. behavioral and statistical detection
Security monitoring
  • Compare attack surface and vulnerability
  • Identify the types of data provided by these technologies
  • Describe the impact of these technologies on data visibility
  • Describe the uses of these data types in security monitoring
  • Describe network attacks, such as protocol-based, denial of service, distributed denial of service and man-in-the-middle
  • Describe web application attacks, such as SQL injection, command injections and crosssite scripting
  • Describe social engineering attacks
  • Describe endpoint-based attacks, such as buffer overflows, command and control (C2), malware and ransomware
  • Describe evasion and obfuscation techniques, such as tunneling, encryption and proxies
  • Describe the impact of certificates on security (includes PKI, public/private crossing the network, asymmetric/symmetric)
  • Identify the certificate components in a given scenario
  • Cipher-suite
Host-based analysis
  • Describe the functionality of these endpoint technologies in regard to security monitoring
  • Identify components of an operating system (such as Windows and Linux) in a given scenario
  • Describe the role of attribution in an investigation
  • Identify type of evidence used based on provided logs
  • Compare tampered and untampered disk image
  • Interpret operating system, application, or command line logs to identify an event
  • Interpret the output report of a malware analysis tool (such as a detonation chamber or sandbox)
Network intrusion analysis
  • Map the provided events to source technologies
  • Compare impact and no impact for these items
  • Compare deep packet inspection with packet filtering and stateful firewall operation
  • Compare inline traffic interrogation and taps or traffic monitoring
  • Compare the characteristics of data obtained from taps or traffic monitoring and transactional data (NetFlow) in the analysis of network traffic
  • Extract files from a TCP stream when given a PCAP file and Wireshark
  • Identify key elements in an intrusion from a given PCAP file
  • Interpret the fields in protocol headers as related to intrusion analysis
  • Interpret common artifact elements from an event to identify an alert
  • Interpret basic regular expressions
Security policies and procedures
  • Describe management concepts
  • Describe the elements in an incident response plan as stated in NIST.SP800-61
  • Apply the incident handling process (such as NIST.SP800-61) to an event
  • Map elements to these steps of analysis based on the NIST.SP800-61
  • Map the organization stakeholders against the NIST IR categories (CMMC, NIST.SP800-61)
  • Describe concepts as documented in NIST.SP800-86
  • Identify these elements used for network profiling
  • Identify these elements used for server profiling
  • Identify protected data in a network
  • Classify intrusion events into categories as defined by security models, such as Cyber Kill Chain Model and Diamond Model of Intrusion
  • Describe the relationship of SOC metrics to scope analysis (time to detect, time to contain, time to respond, time to control)

Meets 8570.1 requirements

Attention DoD Information Assurance workers! This boot camp helps meet U.S. Department of Defense Directive 8570.1 requirements for department employees or contractors engaged in work related to information security.

Guaranteed results

Our boot camp guarantees

Exam Pass Guarantee

If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year (does not apply to CMMC-AB boot camps).

100% Satisfaction Guarantee

If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee

If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.

Unlock team training discounts

If you’re like many of our clients, employee certification is more than a goal — it’s a business requirement. Connect with our team to learn more about our training discounts.

Enroll in a boot camp

  • February 10, 2024 - February 11, 2024

    Dulles, Virginia | Available online

    Exam Pass Guarantee
  • February 24, 2024 - February 25, 2024

    Orlando, Florida | Available online

    Exam Pass Guarantee
  • March 9, 2024 - March 10, 2024

    Dulles, Virginia | Available online

    Exam Pass Guarantee
  • March 23, 2024 - March 24, 2024

    Dallas, Texas | Available online

    Exam Pass Guarantee
  • March 30, 2024 - March 31, 2024

    San Diego, California | Available online

    Exam Pass Guarantee
1 2 3