Cisco Certified CyberOps (Cybersecurity Operations) Associate 國際認可證書課程



本中心現已支援 轉數快 付款。



推介服務:課堂錄影隨時睇
(在家觀看 = 0%,在校觀看 = 100%)

100% 在校觀看日期及時間:
自由選擇,點選以下地區觀看辦公時間及位置

旺角 95折 $5,206 報名 phone
電話:2332-6544
觀塘 9折 $4,932 報名 phone
電話:3563-8425
北角 9折 $4,932 報名 phone
電話:3580-1893
沙田 85折 $4,658 報名 phone
電話:2151-9360
屯門 85折 $4,658 報名 phone
電話:3523-1560

課時: 24 小時

享用時期: 8 星期 (可於報讀日至 4 星期內觀看整個課程,另加 4 星期備用時期)。進度由您控制,可快可慢。

課堂錄影導師:Franco
在校免費試睇:首 3 小時,請致電以上地點與本中心職員預約。

本課程提供在校免費重睇導師解答服務。




信息安全在今天扮演舉足輕重的角色,稍有不慎就會釀成信息安全事故,直接為企業帶來財務和非財務損失。

Cisco Certified CyberOps Associate 認證知識範圍包括安全概念 (Security Concepts)、安全監控 (Security Monitoring)、基於主機的分析 (Host-Based Analysis)、網絡入侵分析 (Network Intrusion Analysis) 和安全政策和規程 (Security Policies and Procedures)。這都是現代信息安全的重要而基礎的課題。

為了能證明你有上述的專業知識,Cisco 便推出其 Cisco Certified CyberOps Associate (思科 CyberOps 工程師) 國際認可考試。本中心的 Cisco Certified CyberOps (Cybersecurity Operations) Associate 國際認可證書課程 由 Franco 籌備多時,精心編排。由上堂、溫習、實習、考試研習、做試題至最後考試,均為你度身訂造,作出有系統的編排。務求令你能夠學習相關知識的同時,又能考取認證。

另外,ISC2 已經認可 Cisco Certified CyberOps Associate 認證持有者可以扣減一年的 CISSP 工作經驗要求。

課程名稱: Cisco Certified CyberOps (Cybersecurity Operations) Associate 國際認可證書課程
- 簡稱:CyberOps Training Course
課程時數: 共 24 小時課堂 (共 8 堂)
適合人士: 對信息安全、Cybersecurity 或 Cybersecurity Operations有興趣的人士
授課語言: 以廣東話為主,輔以英語
課程筆記: 本中心導師親自編寫英文為主筆記,而部份英文字附有中文對照。

1. Franco (CCIE #19772) 親自教授: Franco 具備多張 CCIE 認證 (Enterprise, Routing and Switching、Security 及 Service Provider),並有教授 Cisco 課程的極豐富經驗。
2. Franco 親自編寫筆記: Franco 親自編寫筆記,絕對適合考試及實際工作之用,令你無須「死鋤」如字典般厚及不適合香港讀書格調的書本。
3. 提供模擬考試題目: 本中心為學員提供模擬考試題目,每條考試題目均附有標準答案。而較難理解的題目,均會附有導師的解釋。
4. 取得認證: 本中心的 Cisco Certified CyberOps (Cybersecurity Operations) Associate 國際認可證書課程時數合共 24 小時,教授考試內容及安排課堂實習,令學員取得認證。
5. 免費重讀: 傳統課堂學員可於課程結束後三個月內免費重看課堂錄影。

只要你於下列科目取得合格成績,便可獲 Cisco 頒發 Cisco Certified CyberOps Associate 國際認可證書:

考試編號 科目名稱
200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

本中心為Cisco指定的 Understanding Cisco Cybersecurity Operations Fundamentals (200-201) 考試試場,報考時請致電本中心,登記欲報考之科目考試編號、考試日期及時間 (最快可即日報考)。

臨考試前要繳付考試費 HK$2,348,及必須出示下列兩項有效之身份證明文件,否則考生不可進行考試,而已繳付之考試費亦不會退回:
1. 香港身份證   及
2. 附有考生姓名及簽名的證件 (如信用咭、香港特區護照、BNO等)

考試題目由澳洲考試中心傳送到你要應考的電腦,考試時以電腦作答。所有考試題目均為英文,而大多數的考試題目為單項選擇題 (意即 O) 或多項選擇題 (意即 口),其餘則為配對題。作答完成後會立即出現你的分數,結果即考即知!考試不合格便可重新報考,不限次數。欲知道作答時間、題目總數、合格分數等詳細考試資料,可瀏覽本中心網頁 "各科考試分數資料"。


課程名稱:Cisco Certified CyberOps (Cybersecurity Operations) Associate 國際認可證書課程
- 簡稱:CyberOps Training Course

1.0 Security Concepts
1.1 Describe the CIA triad
1.2 Compare security deployments
1.2.a Network, endpoint, and application security systems
1.2.b Agentless and agent-based protections
1.2.c Legacy antivirus and antimalware
1.2.d SIEM, SOAR, and log management
1.3 Describe security terms
1.3.a Threat intelligence (TI)
1.3.b Threat hunting
1.3.c Malware analysis
1.3.d Threat actor
1.3.e Run book automation (RBA)
1.3.f Reverse engineering
1.3.g Sliding window anomaly detection
1.3.h Principle of least privilege
1.3.i Zero trust
1.3.j Threat intelligence platform (TIP)
1.4 Compare security concepts
1.4.a Risk (risk scoring/risk weighting, risk reduction, risk assessment)
1.4.b Threat
1.4.c Vulnerability
1.4.d Exploit
1.5 Describe the principles of the defense-in-depth strategy
1.6 Compare access control models
1.6.a Discretionary access control
1.6.b Mandatory access control
1.6.c Nondiscretionary access control
1.6.d Authentication, authorization, accounting
1.6.e Rule-based access control
1.6.f Time-based access control
1.6.g Role-based access control
1.7 Describe terms as defined in CVSS
1.7.a Attack vector
1.7.b Attack complexity
1.7.c Privileges required
1.7.d User interaction
1.7.e Scope
1.8 Identify the challenges of data visibility (network, host, and cloud) in detection
1.9 Identify potential data loss from provided traffic profiles
1.10 Interpret the 5-tuple approach to isolate a compromised host in a grouped set of logs
1.11 Compare rule-based detection vs. behavioral and statistical detection

2.0 Security Monitoring
2.1 Compare attack surface and vulnerability
2.2 Identify the types of data provided by these technologies
2.2.a TCP dump
2.2.b NetFlow
2.2.c Next-gen firewall
2.2.d Traditional stateful firewall
2.2.e Application visibility and control
2.2.f Web content filtering
2.2.g Email content filtering
2.3 Describe the impact of these technologies on data visibility
2.3.a Access control list
2.3.b NAT/PAT
2.3.c Tunneling
2.3.d TOR
2.3.e Encryption
2.3.f P2P
2.3.g Encapsulation
2.3.h Load balancing
2.4 Describe the uses of these data types in security monitoring
2.4.a Full packet capture
2.4.b Session data
2.4.c Transaction data
2.4.d Statistical data
2.4.e Metadata
2.4.f Alert data
2.5 Describe network attacks, such as protocol-based, denial of service, distributed denial of
service, and man-in-the-middle
2.6 Describe web application attacks, such as SQL injection, command injections, and cross-site scripting
2.7 Describe social engineering attacks
2.8 Describe endpoint-based attacks, such as buffer overflows, command and control (C2),
malware, and ransomware
2.9 Describe evasion and obfuscation techniques, such as tunneling, encryption, and proxies
2.10 Describe the impact of certificates on security (includes PKI, public/private crossing the
network, asymmetric/symmetric)
2.11 Identify the certificate components in a given scenario
2.11.a Cipher-suite
2.11.b X.509 certificates
2.11.c Key exchange
2.11.d Protocol version
2.11.e PKCS

3.0 Host-Based Analysis
3.1 Describe the functionality of these endpoint technologies in regard to security
monitoring
3.1.a Host-based intrusion detection
3.1.b Antimalware and antivirus
3.1.c Host-based firewall
3.1.d Application-level allow listing/block listing
3.1.e Systems-based sandboxing (such as Chrome, Java, Adobe Reader)
3.2 Identify components of an operating system (such as Windows and Linux) in a given
scenario
3.3 Describe the role of attribution in an investigation
3.3.a Assets
3.3.b Threat actor
3.3.c Indicators of compromise
3.3.d Indicators of attack
3.3.e Chain of custody
3.4 Identify type of evidence used based on provided logs
3.4.a Best evidence
3.4.b Corroborative evidence
3.4.c Indirect evidence
3.5 Compare tampered and untampered disk image
3.6 Interpret operating system, application, or command line logs to identify an event
3.7 Interpret the output report of a malware analysis tool (such as a detonation chamber or
sandbox)
3.7.a Hashes
3.7.b URLs
3.7.c Systems, events, and networking

4.0 Network Intrusion Analysis
4.1 Map the provided events to source technologies
4.1.a IDS/IPS
4.1.b Firewall
4.1.c Network application control
4.1.d Proxy logs
4.1.e Antivirus
4.1.f Transaction data (NetFlow)
4.2 Compare impact and no impact for these items
4.2.a False positive
4.2.b False negative
4.2.c True positive
4.2.d True negative
4.2.e Benign
4.3 Compare deep packet inspection with packet filtering and stateful firewall operation
4.4 Compare inline traffic interrogation and taps or traffic monitoring
4.5 Compare the characteristics of data obtained from taps or traffic monitoring and
transactional data (NetFlow) in the analysis of network traffic
4.6 Extract files from a TCP stream when given a PCAP file and Wireshark
4.7 Identify key elements in an intrusion from a given PCAP file
4.7.a Source address
4.7.b Destination address
4.7.c Source port
4.7.d Destination port
4.7.e Protocols
4.7.f Payloads
4.8 Interpret the fields in protocol headers as related to intrusion analysis
4.8.a Ethernet frame
4.8.b IPv4
4.8.c IPv6
4.8.d TCP
4.8.e UDP
4.8.f ICMP
4.8.g DNS
4.8.h SMTP/POP3/IMAP
4.8.i HTTP/HTTPS/HTTP2
4.8.j ARP
4.9 Interpret common artifact elements from an event to identify an alert
4.9.a IP address (source / destination)
4.9.b Client and server port identity
4.9.c Process (file or registry)
4.9.d System (API calls)
4.9.e Hashes
4.9.f URI / URL
4.10 Interpret basic regular expressions

5.0 Security Policies and Procedures
5.1 Describe management concepts
5.1.a Asset management
5.1.b Configuration management
5.1.c Mobile device management
5.1.d Patch management
5.1.e Vulnerability management
5.2 Describe the elements in an incident response plan as stated in NIST.SP800-61
5.3 Apply the incident handling process (such as NIST.SP800-61) to an event
5.4 Map elements to these steps of analysis based on the NIST.SP800-61
5.4.a Preparation
5.4.b Detection and analysis
5.4.c Containment, eradication, and recovery
5.4.d Post-incident analysis (lessons learned)
5.5 Map the organization stakeholders against the NIST IR categories (CMMC, NIST.SP800-
61)
5.5.a Preparation
5.5.b Detection and analysis
5.5.c Containment, eradication, and recovery
5.5.d Post-incident analysis (lessons learned)
5.6 Describe concepts as documented in NIST.SP800-86
5.6.a Evidence collection order
5.6.b Data integrity
5.6.c Data preservation
5.6.d Volatile data collection
5.7 Identify these elements used for network profiling
5.7.a Total throughput
5.7.b Session duration
5.7.c Ports used
5.7.d Critical asset address space
5.8 Identify these elements used for server profiling
5.8.a Listening ports
5.8.b Logged in users/service accounts
5.8.c Running processes
5.8.d Running tasks
5.8.e Applications
5.9 Identify protected data in a network
5.9.a PII
5.9.b PSI
5.9.c PHI
5.9.d Intellectual property
5.10 Classify intrusion events into categories as defined by security models, such as Cyber Kill Chain Model and Diamond Model of Intrusion
5.11 Describe the relationship of SOC metrics to scope analysis (time to detect, time to
contain, time to respond, time to control)

The course content above may change at any time without notice in order to better reflect the content of the Cisco Certified CyberOps Associate examination.


1 Security Concepts
1.1 Describe the CIA triad
1.2 Compare security deployments
1.2.1 Network, endpoint, and application security systems
1.2.1.1 Firewalls / Next-generation firewalls
1.2.1.1.1 Packet filtering
1.2.1.1.2 Application proxies / Proxy servers
1.2.1.1.3 Network Address Translation (NAT) / Port Address Translation (PAT)
1.2.1.1.3.1 Network Address Translation (NAT)
1.2.1.1.3.2 Port Address Translation (PAT)
1.2.1.1.4 Stateful inspection / Context-aware firewalls
1.2.1.2 Personal firewalls
1.2.1.3 IDS (Intrusion detection systems)
1.2.1.4 IPS (Intrusion prevention systems)
1.2.1.5 Anomaly detection systems
1.2.1.5.1 Pattern matching and stateful pattern-matching
1.2.1.5.2 Protocol analysis
1.2.1.5.3 Heuristic-based analysis
1.2.1.5.4 Anomaly-based analysis
1.2.1.5.5 Global threat correlation capabilities
1.2.1.6 Advanced malware protection (AMP)
1.2.1.6.1 Cisco Secure Endpoint (formerly AMP for Endpoints)
1.2.1.6.2 AMP for Networks
1.2.1.7 Web security appliances (WSA)
1.2.1.8 Email security appliances (ESA)
1.2.1.9 Identity management systems
1.2.2 Agentless and agent-based protections
1.2.2.1 Agent-based
1.2.2.2 Agentless
1.2.3 Legacy antivirus and antimalware
1.2.4 SIEM, SOAR, and log management
1.2.4.1 Log management
1.2.4.2 SIEM (Security Information and Event Management)
1.2.4.3 SOAR (Security Orchestration, Automation, and Response)
1.3 Describe security terms
1.3.1 Threat intelligence (TI)
1.3.2 Threat hunting
1.3.3 Malware analysis
1.3.4 Threat actor
1.3.5 Run book automation / Runbook automation (RBA)
1.3.6 Reverse engineering
1.3.7 Sliding window anomaly detection
1.3.8 Principle of least privilege (PoLP)
1.3.9 Zero trust
1.3.10 Threat intelligence platform (TIP)
1.4 Compare security concepts
1.4.1 Risk (risk scoring/risk weighting, risk reduction, risk assessment)
1.4.1.1 Risk
1.4.1.2 Risk assessment and risk reduction
1.4.1.3 Risk scoring / risk weighting
1.4.2 Threat
1.4.3 Vulnerability
1.4.4 Exploit
1.4.4.1 Zero-day / 0-day
1.5 Describe the principles of the defense-in-depth strategy
1.6 Compare access control models
1.6.1 Discretionary access control (DAC)
1.6.2 Nondiscretionary access control
1.6.3 Mandatory access control (MAC)
1.6.4 Role-based access control (RBAC)
1.6.5 Attribute-Based Access Control
1.6.6 Rule-based access control
1.6.7 Time-based access control
1.6.8 Authentication, authorization, accounting (AAA)
1.6.8.1 Authentication
1.6.8.2 Authorization
1.6.8.3 Accounting
1.6.8.4 AAA protocols
1.6.8.4.1 RADIUS
1.6.8.4.2 TACACS+
1.7 Describe terms as defined in CVSS
1.7.1 Attack vector (AV)
1.7.2 Attack complexity (AC)
1.7.3 Privileges required
1.7.4 User interaction
1.7.5 Scope
1.8 Identify the challenges of data visibility (network, host, and cloud) in detection and identify potential data loss from provided traffic profiles
1.9 Interpret the 5-tuple approach to isolate a compromised host in a grouped set of logs
1.10 Compare rule-based detection vs. behavioral and statistical detection

2 Security Monitoring
2.1 Compare attack surface and vulnerability
2.1.1 Attack surface
2.1.2 Vulnerability
2.2 Identify the types of data provided by these technologies
2.2.1 TCP dump
2.2.1.1 Introduction to TCP dump
2.2.1.2 Installation
2.2.1.3 Common use cases
2.2.1.3.1 Traffic from or to an interface
2.2.1.3.2 Traffic from or to an IP address
2.2.1.3.3 Traffic from or to a network
2.2.1.3.4 Display the packet contents
2.2.1.3.5 Traffic of a protocol
2.2.1.3.6 Traffic of a port
2.2.1.3.7 Combinations (and, or, not)
2.2.1.3.8 HTTP (e.g., Methods, Host, User-Agent, etc.)
2.2.1.3.9 TCP Flags (e.g., SYN)
2.2.1.3.10 Export to a file
2.2.2 Wireshark
2.2.2.1 Introduction to Wireshark
2.2.2.2 Installation
2.2.2.3 Capture filter
2.2.2.4 Display filter
2.2.2.4.1 Display Filter comparison operators
2.2.2.4.2 Display Filter Field Types
2.2.2.4.2.1 Ethernet address
2.2.2.4.2.2 IPv4 address
2.2.2.4.2.3 IPv6 address
2.2.2.4.3 Combining Expressions
2.2.3 NetFlow
2.2.3.1 Introduction to NetFlow
2.2.3.2 Flow concepts
2.2.3.3 NetFlow Architecture and configurations
2.2.3.4 Netflow versions
2.2.3.5 Internet Protocol Flow Information Export (IPFIX)
2.2.3.6 NetFlow analysis tools
2.2.3.6.1 Cisco Secure Network Analytics (Stealthwatch)
2.2.3.6.2 Open-Source NetFlow Analysis Tools
2.2.4 Traditional stateful firewall
2.2.5 Next-gen / Next-generation firewall (NGFW)
2.2.6 Application visibility and control (AVC)
2.2.6.1 Application of Application visibility and control (AVC): Protocol discovery
2.2.6.2 Application of Application visibility and control (AVC): Quality of Service (QoS)
2.2.7 Web content filtering
2.2.8 Email content filtering
2.3 Describe the impact of these technologies on data visibility
2.3.1 Access control list
2.3.2 NAT/PAT
2.3.3 Tunneling and data exfiltration
2.3.4 TOR
2.3.5 P2P (Peer-to-Peer)
2.3.6 Encryption
2.3.7 Encapsulation
2.3.8 Load balancing
2.4 Describe the uses of these data types in security monitoring
2.4.1 Full packet capture
2.4.2 Session data and Transaction data
2.4.3 Statistical data
2.4.4 Metadata
2.4.5 Alert data
2.5 Describe network attacks, such as protocol-based, denial of service, distributed denial of service, and man-in-the-middle
2.5.1 Reconnaissance Attacks
2.5.1.1 Nmap
2.5.1.1.1 TCP scan
2.5.1.1.2 UDP scan
2.5.1.1.3 Scan a range of IP addresses
2.5.2 Privilege Escalation Attacks
2.5.3 Backdoors
2.5.4 Man-in-the Middle Attacks
2.5.4.1 Man-in-the Middle Attacks (Layer 2)
2.5.4.2 Man-in-the Middle Attacks (Layer 3)
2.5.5 Denial of Service (DoS) and Distributed DoS (DDoS)
2.5.5.1 Denial of Service (DoS)
2.5.5.2 Distributed Denial of Service (DDoS)
2.5.5.2.1 Direct DDoS attacks
2.5.5.2.2 Reflected
2.5.5.2.3 Amplification DDoS attacks
2.5.6 Route Manipulation Attacks
2.5.7 Password Attacks
2.6 Describe web application attacks, such as SQL injection (SQLI), command injections, and cross site scripting (XSS)
2.6.1 SQL (Structured Query Language) injection
2.6.2 Cross Site Scripting (XSS)
2.6.2.1 HTML Injection
2.6.2.2 Command Injection
2.6.3 Cross Site Request Forgery (CSRF / XSRF)
2.7 Describe social engineering attacks
2.8 Describe endpoint-based attacks, such as buffer overflows, command and control (C2), malware, and ransomware
2.8.1 Buffer overflows
2.8.2 Command and control (C2)
2.8.3 Malware
2.8.4 Ransomware
2.9 Describe evasion and obfuscation techniques, such as tunneling, encryption, and proxies
2.9.1 Tunneling, encryption, and proxies
2.9.2 Resource Exhaustion
2.9.3 Traffic Fragmentation
2.9.4 Protocol-Level Misinterpretation
2.9.5 Traffic Timing, Substitution, and Insertion
2.9.6 Kill chain and pivoting
2.9.6.1 Kill chain
2.9.6.2 Pivoting
2.10 Describe the impact of certificates on security (includes PKI, public/private crossing the network, asymmetric/symmetric), Identify the certificate components in a given scenario, Cipher-suite, X.509 certificates, Key exchange, Protocol version, PKCS
2.10.1 Key terms and definitions
2.10.2 Methods of cryptography
2.10.2.1 Stream-based Ciphers
2.10.2.2 Block Ciphers
2.10.3 Running Key Cipher with modular mathematics
2.10.4 One-time Pad
2.10.5 Symmetric encryption
2.10.6 Cryptographic hash functions
2.10.6.1 Introduction to Cryptographic hash functions
2.10.6.2 Common cryptographic hash functions
2.10.6.3 Integrity provided by hash functions
2.10.6.4 Storing sensitive information
2.10.6.5 HMAC
2.10.6.6 Salt
2.10.7 Asymmetric algorithms
2.10.7.1 Encryption process
2.10.7.2 Digital signatures and non-repudiation
2.10.7.3 RSA
2.10.7.4 Diffie-Hellmann Algorithm
2.10.7.5 El Gamal and DSA
2.10.7.6 Elliptic Curve Cryptography (ECC)
2.10.7.7 Advantages and disadvantages of asymmetric algorithms
2.10.7.8 Hybrid Cryptography
2.10.8 Quantum cryptography
2.10.9 Next-Generation Encryption (NGE)
2.10.10 Public Key Infrastructure (PKI) and digital certificates
2.10.10.1 Certificate Authority (CA) and digital certificates
2.10.10.2 Registration Authority (RA), Validation Authority (VA), Certificate Revocation List (CRL) and Online Certificate Status Protocol (OSCP)
2.10.10.2.1 Registration Authority (RA)
2.10.10.2.2 Validation Authority (VA), Certificate Revocation List (CRL), Online Certificate Status Protocol (OSCP) and Validation Authority (VA)
2.10.10.3 Subordinate or intermediate certificates
2.10.10.4 Public Key Cryptography Standards (PKCS) and other protocols
2.10.10.4.1 Public Key Cryptography Standards (PKCS)
2.10.10.4.2 Simple Certificate Enrollment Protocol (SCEP)
2.10.10.5 Transport Layer Security (TLS / SSL)
2.10.10.6 SSH (Secure Shell)

3 Host-Based Analysis
3.1 Describe the functionality of these endpoint technologies in regard to security monitoring
3.1.1 Host-based firewall, host-based intrusion detection (HIDS), Antimalware, antivirus and email security
3.1.2 Application-level allow white/black listing
3.1.3 Systems-based sandboxing (such as Chrome, Java, Adobe Reader)
3.2 Identify components of an operating system (such as Windows and Linux) in a given Scenario
3.2.1 Windows
3.2.1.1 Processes, threads and services
3.2.1.1.1 Processes and threads
3.2.1.1.2 Services
3.2.1.2 Memory management
3.2.1.3 Windows registry
3.2.1.4 The Windows File System
3.2.1.4.1 Master Boot Record (MBR)
3.2.1.4.2 File System (FS)
3.2.1.4.3 Master File Table (MFT)
3.2.1.4.4 Unified Extensible Firmware Interface (UEFI)
3.2.2 Linux
3.2.2.1 Processes
3.2.2.2 Linux MBR
3.2.2.3 Linux File Systems
3.3 Describe the role of attribution in an investigation
3.3.1 Assets and risk
3.3.2 Threat actor
3.3.3 Indicators of compromise, indicators of attack and Cisco Secure Malware Analytics (Threat Grid)
3.3.4 Chain of custody
3.4 Identify type of evidence used based on provided logs
3.4.1 Digital evidence
3.4.2 Best evidence
3.4.3 Corroborative evidence
3.4.4 Indirect or circumstantial evidence
3.5 Compare tampered and untampered disk image
3.6 Interpret operating system, application, or command line logs to identify an event
3.6.1 Logs from user endpoints
3.6.1.1 Cisco AnyConnect Secure Mobility Client
3.6.1.2 Cisco Identity Services Engine (ISE)
3.6.2 Logs from servers
3.6.2.1 Syslog
3.6.2.1.1 Syslog facility
3.6.2.1.2 Syslog severity level
3.6.2.2 Other logs
3.6.3 Listening Ports
3.6.4 Logged-in Users / Service Accounts
3.6.5 Running processes
3.6.6 Applications Identification
3.6.7 Analyzing Windows Endpoints
3.6.7.1 Windows processes and threads
3.6.7.2 Memory Allocation
3.6.7.3 Windows Registry
3.6.7.4 Windows Management Instrumentation (WMI)
3.6.7.5 Handles
3.6.7.6 Services
3.6.7.7 Windows Event Logs
3.6.8 Analyzing Linux and macOS Endpoints
3.6.8.1 Processes
3.6.8.2 Forks
3.6.8.3 Permissions
3.6.8.4 Symlinks (symbolic link / soft link)
3.6.8.5 Daemons
3.6.8.6 Syslog, Apache and Nginx logs
3.6.8.6.1 Syslog
3.6.8.6.2 Apache logs
3.6.8.6.3 NGINX logs
3.7 Interpret the output report of a malware analysis tool (such as a detonation chamber or sandbox), Hashes, URLs, Systems, events, and networking
3.7.1 Cuckoo
3.7.2 Other malware analysis tools

4 Network Intrusion Analysis
4.1 Map the provided events to source technologies
4.1.1 Firewall
4.1.2 Network application control
4.1.3 Proxy logs
4.1.4 Antivirus
4.1.5 Transaction data (NetFlow)
4.2 Compare impact and no impact for these items
4.2.1 False positive and Benign
4.2.2 False negative
4.2.3 True positive
4.2.4 True negative
4.3 Compare deep packet inspection with packet filtering and stateful firewall operation
4.4 Compare inline traffic interrogation and taps or traffic monitoring
4.4.1 Inline traffic interrogation
4.4.2 Taps or traffic monitoring
4.5 Compare the characteristics of data obtained from taps or traffic monitoring and transactional data (NetFlow) in the analysis of network traffic
4.6 Extract files from a TCP stream when given a PCAP file and Wireshark
4.6.1 Follow TCP Stream
4.6.2 Follow HTTP Stream
4.6.3 Follow HTTP/2 Stream
4.6.4 Follow UDP / QUIC Stream
4.7 Identify key elements in an intrusion from a given PCAP file
4.7.1 Source address
4.7.2 Destination address
4.7.3 Source port
4.7.4 Destination port
4.7.5 Protocols
4.7.6 Payloads
4.8 Interpret the fields in protocol headers as related to intrusion analysis
4.8.1 Ethernet frame
4.8.2 IPv4
4.8.3 IPv6
4.8.4 TCP
4.8.5 UDP
4.8.6 ICMP
4.8.7 DNS
4.8.8 SMTP/POP3/IMAP
4.8.9 HTTP/HTTPS/HTTP2
4.8.9.1 HTTP
4.8.9.2 HTTPS / TLS / HTTP2
4.8.9.2.1 HTTP2
4.8.9.2.2 HTTPS / TLS
4.8.10 ARP
4.9 Interpret common artifact elements from an event to identify an alert
4.9.1 IP address (source / destination)
4.9.2 Client and server port identity
4.9.3 Process (file or registry)
4.9.4 System (API calls)
4.9.5 Hashes
4.9.6 URI / URL
4.10 Interpret basic regular expressions
4.10.1 Regex object
4.10.1.1 Demonstration: Regex object
4.10.2 Modifiers
4.10.2.1 Demonstration: Modifiers
4.10.3 Brackets
4.10.3.1 Demonstration: Brackets
4.10.4 Metacharacters
4.10.4.1 Demonstration: Metacharacters
4.10.5 Quantifiers
4.10.5.1 Demonstration: Metacharacters
4.10.6 More examples

5 Security Policies and Procedures
5.1 Describe management concepts
5.1.1 Asset management
5.1.1.1 Asset Inventory
5.1.1.2 Asset ownership
5.1.1.3 Asset Acceptable Use and Return Policies
5.1.1.4 Asset Classification
5.1.1.5 Asset Labeling, information handling
5.1.1.6 Media management
5.1.2 Configuration management / SecCM
5.1.2.1 Configuration Management (CM)
5.1.2.2 Configuration Item (CI)
5.1.2.3 Baseline configuration
5.1.2.4 Security-focused configuration management (SecCM)
5.1.3 Mobile device management (MDM)
5.1.4 Patch management
5.1.4.1 Enterprise patch management technologies
5.1.4.1.1 Agent-based
5.1.4.1.2 Agentless-based
5.1.4.1.3 Passive network monitoring
5.1.4.1.4 Comparison between agent-based, agentless-based and passive network monitoring
5.1.4.2 Patch management process
5.1.5 Vulnerability management
5.1.5.1 Vulnerability identification
5.1.5.2 Vulnerability analysis and prioritization
5.1.5.3 Product Vulnerability Management
5.1.5.4 Security Content Automation Protocol (SCAP)
5.1.5.5 Vulnerability Remediation
5.2 Describe the elements in an incident response plan as stated in NIST.SP 800-61
5.2.1 Background information about incident response
5.2.2 Why incident response?
5.2.3 Elements in an incident response plan
5.3 Apply the incident handling process (such as NIST.SP 800-61) to an event, map elements to these steps of analysis based on the NIST.SP 800-61, map the organization stakeholders against the NIST IR categories (CMMC, NIST.SP 800-61)
5.3.1 Preparation
5.3.1.1 Preparing to handle incidents
5.3.1.1.1 Incident handler communications and facilities
5.3.1.1.2 Incident analysis hardware and software
5.3.1.1.3 Incident analysis resources
5.3.1.2 Preventing incidents
5.3.2 Detection and analysis
5.3.2.1 Attack vectors
5.3.2.2 Sign of an incident
5.3.2.2.1 Alerts
5.3.2.2.2 Logs
5.3.2.2.3 Information available from the public
5.3.2.2.4 People
5.3.2.3 Incident analysis
5.3.2.4 Incident prioritization
5.3.2.5 Incident notification
5.3.3 Containment, eradication, and recovery
5.3.3.1 Containment
5.3.3.2 Evidence gathering and handling
5.3.3.3 Identifying the attacking hosts
5.3.3.4 Eradication and recovery
5.3.3.4.1 Eradication
5.3.3.4.2 Recovery
5.3.4 Post-incident activity / analysis (lessons learned)
5.3.4.1 Lessons Learned
5.3.4.2 Using collected incident data
5.3.4.3 Evidence Retention
5.3.5 Cybersecurity Maturity Model Certification (CMMC)
5.4 Describe concepts as documented in NIST.SP 800-86
5.4.1 Evidence collection order and volatile data collection
5.4.2 Data integrity
5.4.3 Data preservation
5.5 Identify these elements used for network profiling
5.5.1 Total throughput
5.5.2 Session duration
5.5.3 Ports used
5.5.4 Critical asset address space
5.6 Identify these elements used for server profiling
5.6.1 Listening ports
5.6.2 Logged in users / service accounts
5.6.3 Running processes / running tasks
5.6.4 Applications
5.7 Identify protected data in a network
5.7.1 PII and PSI
5.7.2 PHI
5.7.3 Intellectual property
5.7.3.1 Copyrights
5.7.3.2 Trademarks
5.7.3.3 Patents
5.7.3.4 Trade secrets
5.7.4 Classify intrusion events into categories as defined by security models, such as Cyber Kill Chain Model and Diamond Model of Intrusion
5.7.4.1 Cyber Kill Chain Model
5.7.4.2 Diamond Model / Diamond Model of Intrusion
5.7.4.2.1 Basic components
5.7.4.2.2 Analytic pivoting
5.7.4.2.3 Additional meta-features
5.7.4.2.4 Activity thread and attack graph
5.7.5 Describe the relationship of SOC metrics to scope analysis (time to detect, time to contain, time to respond, time to control)

6 Appendix
6.1 Cybersecurity frameworks
6.2 More standards, guidelines, references, and documents


回到頂端 keyboard_arrow_up