Cisco Certified CyberOps Associate Learning Path

Learn the skills needed to pass the 210-250 and 210-255 certification exams.

6 hours,

Quick facts

About this learning path

  • courses

    100% online

  • Duration

    6 hours,

  • Assessment


About Cisco Certified CyberOps Associate

The Cisco Certified CyberOps Associate Learning Path prepares you to begin a career working with associate-level cybersecurity analysts within security operations centers. You'll gain an understanding of cybersecurity’s basic principles, foundational knowledge and core skills needed to grasp the more advanced associate-level materials in the second required exam.



CCNA Cyber Ops Skill Assessment

Assessment - 60 questions

Cisco Certified CyberOps Associate Practice Exam

Assessment - 120 questions

Custom Cisco Certified CyberOps Associate Practice Exam

Assessment - 120 questions

Introduction to Cisco Certified CyberOps Associate

Course - 00:11:00

This course prepares you for your Cisco Certified CyberOps Associate training. You'll follow along with the course examples and set up your own cybersecurity lab with Kali Linux, which is commonly used for digital forensics and penetration testing.
Network Concepts

Course - 00:44:00

Networks can be complex, confusing and tricky. With this course, you'll dive into the devices and protocols used in networking, getting to grips with the basics of what you'll need to know for a successful security analyst career.
Security Concepts

Course - 00:42:00

Cybersecurity has never been more important than it is today. In this course, you'll get a closer introduction to some of the basic security concepts and tools that will help you later on in the CCNA Cyber Ops Learning Path — and in the rest of your career!

Course - 00:14:00

Explore the secrets of cryptography and data protection! This course will help you understand the differences between things like encryption, hashing and certificates, making it easier for you to understand the intricacies of data protection.
Host-Based Analysis

Course - 00:38:00

In this course, you'll get to grips with the complexities and challenges of host-based analysis. You'll look at HBA on Microsoft and Linux, including endpoint protection, blacklisting, systems-based sandboxing and more.
Security Monitoring

Course - 00:21:00

The best offense is a good defense ... or is it the other way around? In this course, you will learn how to stop a problem before it starts by detecting potential threats with security monitoring software features.
Attack Methods

Course - 00:28:00

The war between hackers and security experts is ongoing, and the weapons are always evolving. In this course, you'll learn the about different strategies used by hackers to attack a network and cause damage.
Endpoint Threat Analysis and Computer Forensics

Course - 00:19:00

In this course, you'll get a chance to explore some of the details of computer forensics. You'll take a closer look at Common Vulnerability Scoring System (CVSS) 3.0, Microsoft Windows and Linux file systems, evidence handling and more.
Network Intrusion Analysis

Course - 00:17:00

In this course, you'll discover the types of information that you want to look for during network intrusion analysis. You'll get a look at security analysis with Wireshark, Netflow v5 and security events, impact flags and more.
Incident Response and Handling

Course - 00:34:00

How you respond to an incident may mean the difference between safety or disaster on a network level. In this course, you'll be introduced to security frameworks and regulations that affect your incident response, including NIST and HIPAA.
Data and Event Analysis

Course - 00:21:00

Once you have the data, you need to analyze it. Explore the details of data and event analysis, including retrospective analysis, data normalization and threat analysis.

Meet the author

Matt Carey

Matt Carey is a network engineer who has been in the IT field for over a decade. He has worked on over 100 networks with his main focus being Cisco WAN, DC, SDN and security solutions.

Working as a consultant has given him exposure to many different technologies and skills, which has helped him excel in IT. Teaching has always been one of his passions, and he started working as an instructor about five years into his career. He enjoys using his experience to help others further their careers in IT and security.

The details

Learning path insights

How to claim CPEs

Should you complete this learning path, you’ll be able to download a certificate of completion. Use this to claim your CPEs or CPUs.

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • All-Source Analyst
  • Mission Assessment Specialist
  • Exploitation Analyst

No software. No set up. Unlimited access.

Skip the server racks and spin up a realistic environment with one click. Infosec Skills cyber ranges require no additional software, hardware or server space so your team can spend less time configuring environments and more time learning. Unlimited cyber range access is included in every Infosec Skills subscription so your team can skill up however they learn best.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo