CyberOps Training Course Training 課程
  Facebook: CyberOps Training Course Training 課程
 
CyberOps Training Course Training 課程
CyberOps Training Course Training 課程 CyberOps Training Course Training 課程 CyberOps Training Course Training 課程 CyberOps Training Course Training 課程 CyberOps Training Course Training 課程 CyberOps Training Course Training 課程 CyberOps Training Course Training 課程 CyberOps Training Course Training 課程 CyberOps Training Course Training 課程 CyberOps Training Course Training 課程 CyberOps Training Course Training 課程  
CyberOps Training Course Training 課程 CyberOps Training Course Training 課程

想定期知道最新課程及優惠嗎?
免費訂閱本中心的課程通訊!

課堂錄影隨時睇 10 大優點之導師解答:您可於觀看某一課堂視像後提出相關問題,課程導師會樂意為學員以單對單的形式解答!

Cisco Certified CyberOps (Cybersecurity Operations) Associate 國際認可證書課程
課程簡稱:CyberOps Training Course


  • 課程時間
  • 課程簡介
  • 課程特點
  • 考試須知
  • 課程內容

傳統服務:課程上堂時間表 (地點:旺角   總費用:$5,480)
學員使用電話或本網頁報名,待本中心確認已為學員留位後,即可使用 轉數快 繳付學費,過程簡便!

超震撼: 凡於 2021年 12月 3日 (五) 或之前報讀本課程,
原價 $6,850,現只需
$5,480!

編號 日期 (dd/mm) 星期 時間 費用 導師  
CP0113CM  10/01 - 09/02
10/1/2022, 12/1, 17/1, 19/1, 24/1, 26/1, 7/2, 9/2/2022
 下載詳細上課日期
一、三 7:00pm - 10:00pm $5,480 Franco 按此報名:CyberOps Training Course Training 課程
* 各政府部門可使用 P Card 付款  

*** 質素保證: 免費於任何地點試睇首 3 小時課堂錄影,從而可預先了解導師及教材的質素,才報讀課程來上堂。***
請致電與本中心職員預約。 查看各地點電話
旺角 2332-6544
觀塘 3563-8425
北角 3580-1893
沙田 2151-9360
屯門 3523-1560

免費補堂: 學員可於任何地點補看課堂錄影,從而可銜接往後的課堂!
免費重讀: 學員可於課程結束後三個月內於任何地點不限次數地重看課堂錄影,從而可反覆重溫整個課程!
課時: 24 小時
課堂導師: Franco (任教課程清單)

傳統服務的免費補堂或免費重讀,若選擇旺角或觀塘的閒日星期一至四,便需於 6:30p.m. 或之前完成觀看課堂錄影。


地區 地址 電話 教育局註冊編號
旺角 九龍旺角亞皆老街 109 號,皆旺商業大廈 18 樓 1802 - 1807 室 2332-6544 533459
觀塘 九龍觀塘成業街 7 號寧晉中心 12 樓 G2 室 3563-8425 588571
北角 香港北角馬寶道 41-47 號華寶商業大廈 3 樓 01-02 號舖 3580-1893 591262
沙田 新界沙田石門安群街 3 號京瑞廣場 1 期 10 樓 M 室 2151-9360 604488
屯門 新界屯門屯喜路 2 號屯門柏麗廣場 17 樓 1708 室 3523-1560 592552
注意! 客戶必須查問報讀學校的教育局註冊編號,以確認該校為註冊學校,以免蒙受不必要的損失!


信息安全在今天扮演舉足輕重的角色,稍有不慎就會釀成信息安全事故,直接為企業帶來財務和非財務損失。

Cisco Certified CyberOps Associate 認證知識範圍包括安全概念 (Security Concepts)、安全監控 (Security Monitoring)、基於主機的分析 (Host-Based Analysis)、網絡入侵分析 (Network Intrusion Analysis) 和安全政策和規程 (Security Policies and Procedures)。這都是現代信息安全的重要而基礎的課題。

為了能證明你有上述的專業知識,Cisco 便推出其 Cisco Certified CyberOps Associate (思科 CyberOps 工程師) 國際認可考試。本中心的 Cisco Certified CyberOps (Cybersecurity Operations) Associate 國際認可證書課程 由 Franco 籌備多時,精心編排。由上堂、溫習、實習、考試研習、做試題至最後考試,均為你度身訂造,作出有系統的編排。務求令你能夠學習相關知識的同時,又能考取認證。

另外,ISC2 已經認可 Cisco Certified CyberOps Associate 認證持有者可以扣減一年的 CISSP 工作經驗要求。


課程名稱: Cisco Certified CyberOps (Cybersecurity Operations) Associate 國際認可證書課程
- 簡稱:CyberOps Training Course
課程時數: 共 24 小時課堂 (共 8 堂)
適合人士: 對信息安全、Cybersecurity 或 Cybersecurity Operations有興趣的人士
授課語言: 以廣東話為主,輔以英語
課程筆記: 本中心導師親自編寫英文為主筆記,而部份英文字附有中文對照。

1. Franco (CCIE #19772) 親自教授: Franco 具備多張 CCIE 認證 (Enterprise, Routing and Switching、Security 及 Service Provider),並有教授 Cisco 課程的極豐富經驗。
2. Franco 親自編寫筆記: Franco 親自編寫筆記,絕對適合考試及實際工作之用,令你無須「死鋤」如字典般厚及不適合香港讀書格調的書本。
3. 提供模擬考試題目: 本中心為學員提供約 200 條模擬考試題目,每條考試題目均附有標準答案。而較難理解的題目,均會附有導師的解釋。
4. 取得認證: 本中心的 Cisco Certified CyberOps (Cybersecurity Operations) Associate 國際認可證書課程時數合共 24 小時,教授考試內容及安排課堂實習,令學員取得認證。
5. 免費重讀: 傳統課堂學員可於課程結束後三個月內免費重看課堂錄影。

只要你於下列科目取得合格成績,便可獲 Cisco 頒發 Cisco Certified CyberOps Associate 國際認可證書:

考試編號 科目名稱
200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

本中心為Cisco指定的 Understanding Cisco Cybersecurity Operations Fundamentals (200-201) 考試試場,報考時請致電本中心,登記欲報考之科目考試編號、考試日期及時間 (最快可即日報考)。

臨考試前要繳付考試費 HK$2,348,及必須出示下列兩項有效之身份證明文件,否則考生不可進行考試,而已繳付之考試費亦不會退回:
1. 香港身份證   及
2. 附有考生姓名及簽名的證件 (如信用咭、香港特區護照、BNO等)

考試題目由澳洲考試中心傳送到你要應考的電腦,考試時以電腦作答。所有考試題目均為英文,而大多數的考試題目為單項選擇題 (意即 O) 或多項選擇題 (意即 口),其餘則為配對題。作答完成後會立即出現你的分數,結果即考即知!考試不合格便可重新報考,不限次數。欲知道作答時間、題目總數、合格分數等詳細考試資料,可瀏覽本中心網頁 "各科考試分數資料"。




課程名稱:Cisco Certified CyberOps (Cybersecurity Operations) Associate 國際認可證書課程
- 簡稱:CyberOps Training Course

1.0 Security Concepts
1.1 Describe the CIA triad
1.2 Compare security deployments
1.2.a Network, endpoint, and application security systems
1.2.b Agentless and agent-based protections
1.2.c Legacy antivirus and antimalware
1.2.d SIEM, SOAR, and log management
1.3 Describe security terms
1.3.a Threat intelligence (TI)
1.3.b Threat hunting
1.3.c Malware analysis
1.3.d Threat actor
1.3.e Run book automation (RBA)
1.3.f Reverse engineering
1.3.g Sliding window anomaly detection
1.3.h Principle of least privilege
1.3.i Zero trust
1.3.j Threat intelligence platform (TIP)
1.4 Compare security concepts
1.4.a Risk (risk scoring/risk weighting, risk reduction, risk assessment)
1.4.b Threat
1.4.c Vulnerability
1.4.d Exploit
1.5 Describe the principles of the defense-in-depth strategy
1.6 Compare access control models
1.6.a Discretionary access control
1.6.b Mandatory access control
1.6.c Nondiscretionary access control
1.6.d Authentication, authorization, accounting
1.6.e Rule-based access control
1.6.f Time-based access control
1.6.g Role-based access control
1.7 Describe terms as defined in CVSS
1.7.a Attack vector
1.7.b Attack complexity
1.7.c Privileges required
1.7.d User interaction
1.7.e Scope
1.8 Identify the challenges of data visibility (network, host, and cloud) in detection
1.9 Identify potential data loss from provided traffic profiles
1.10 Interpret the 5-tuple approach to isolate a compromised host in a grouped set of logs
1.11 Compare rule-based detection vs. behavioral and statistical detection

2.0 Security Monitoring
2.1 Compare attack surface and vulnerability
2.2 Identify the types of data provided by these technologies
2.2.a TCP dump
2.2.b NetFlow
2.2.c Next-gen firewall
2.2.d Traditional stateful firewall
2.2.e Application visibility and control
2.2.f Web content filtering
2.2.g Email content filtering
2.3 Describe the impact of these technologies on data visibility
2.3.a Access control list
2.3.b NAT/PAT
2.3.c Tunneling
2.3.d TOR
2.3.e Encryption
2.3.f P2P
2.3.g Encapsulation
2.3.h Load balancing
2.4 Describe the uses of these data types in security monitoring
2.4.a Full packet capture
2.4.b Session data
2.4.c Transaction data
2.4.d Statistical data
2.4.e Metadata
2.4.f Alert data
2.5 Describe network attacks, such as protocol-based, denial of service, distributed denial of
service, and man-in-the-middle
2.6 Describe web application attacks, such as SQL injection, command injections, and cross-site scripting
2.7 Describe social engineering attacks
2.8 Describe endpoint-based attacks, such as buffer overflows, command and control (C2),
malware, and ransomware
2.9 Describe evasion and obfuscation techniques, such as tunneling, encryption, and proxies
2.10 Describe the impact of certificates on security (includes PKI, public/private crossing the
network, asymmetric/symmetric)
2.11 Identify the certificate components in a given scenario
2.11.a Cipher-suite
2.11.b X.509 certificates
2.11.c Key exchange
2.11.d Protocol version
2.11.e PKCS

3.0 Host-Based Analysis
3.1 Describe the functionality of these endpoint technologies in regard to security
monitoring
3.1.a Host-based intrusion detection
3.1.b Antimalware and antivirus
3.1.c Host-based firewall
3.1.d Application-level allow listing/block listing
3.1.e Systems-based sandboxing (such as Chrome, Java, Adobe Reader)
3.2 Identify components of an operating system (such as Windows and Linux) in a given
scenario
3.3 Describe the role of attribution in an investigation
3.3.a Assets
3.3.b Threat actor
3.3.c Indicators of compromise
3.3.d Indicators of attack
3.3.e Chain of custody
3.4 Identify type of evidence used based on provided logs
3.4.a Best evidence
3.4.b Corroborative evidence
3.4.c Indirect evidence
3.5 Compare tampered and untampered disk image
3.6 Interpret operating system, application, or command line logs to identify an event
3.7 Interpret the output report of a malware analysis tool (such as a detonation chamber or
sandbox)
3.7.a Hashes
3.7.b URLs
3.7.c Systems, events, and networking

4.0 Network Intrusion Analysis
4.1 Map the provided events to source technologies
4.1.a IDS/IPS
4.1.b Firewall
4.1.c Network application control
4.1.d Proxy logs
4.1.e Antivirus
4.1.f Transaction data (NetFlow)
4.2 Compare impact and no impact for these items
4.2.a False positive
4.2.b False negative
4.2.c True positive
4.2.d True negative
4.2.e Benign
4.3 Compare deep packet inspection with packet filtering and stateful firewall operation
4.4 Compare inline traffic interrogation and taps or traffic monitoring
4.5 Compare the characteristics of data obtained from taps or traffic monitoring and
transactional data (NetFlow) in the analysis of network traffic
4.6 Extract files from a TCP stream when given a PCAP file and Wireshark
4.7 Identify key elements in an intrusion from a given PCAP file
4.7.a Source address
4.7.b Destination address
4.7.c Source port
4.7.d Destination port
4.7.e Protocols
4.7.f Payloads
4.8 Interpret the fields in protocol headers as related to intrusion analysis
4.8.a Ethernet frame
4.8.b IPv4
4.8.c IPv6
4.8.d TCP
4.8.e UDP
4.8.f ICMP
4.8.g DNS
4.8.h SMTP/POP3/IMAP
4.8.i HTTP/HTTPS/HTTP2
4.8.j ARP
4.9 Interpret common artifact elements from an event to identify an alert
4.9.a IP address (source / destination)
4.9.b Client and server port identity
4.9.c Process (file or registry)
4.9.d System (API calls)
4.9.e Hashes
4.9.f URI / URL
4.10 Interpret basic regular expressions

5.0 Security Policies and Procedures
5.1 Describe management concepts
5.1.a Asset management
5.1.b Configuration management
5.1.c Mobile device management
5.1.d Patch management
5.1.e Vulnerability management
5.2 Describe the elements in an incident response plan as stated in NIST.SP800-61
5.3 Apply the incident handling process (such as NIST.SP800-61) to an event
5.4 Map elements to these steps of analysis based on the NIST.SP800-61
5.4.a Preparation
5.4.b Detection and analysis
5.4.c Containment, eradication, and recovery
5.4.d Post-incident analysis (lessons learned)
5.5 Map the organization stakeholders against the NIST IR categories (CMMC, NIST.SP800-
61)
5.5.a Preparation
5.5.b Detection and analysis
5.5.c Containment, eradication, and recovery
5.5.d Post-incident analysis (lessons learned)
5.6 Describe concepts as documented in NIST.SP800-86
5.6.a Evidence collection order
5.6.b Data integrity
5.6.c Data preservation
5.6.d Volatile data collection
5.7 Identify these elements used for network profiling
5.7.a Total throughput
5.7.b Session duration
5.7.c Ports used
5.7.d Critical asset address space
5.8 Identify these elements used for server profiling
5.8.a Listening ports
5.8.b Logged in users/service accounts
5.8.c Running processes
5.8.d Running tasks
5.8.e Applications
5.9 Identify protected data in a network
5.9.a PII
5.9.b PSI
5.9.c PHI
5.9.d Intellectual property
5.10 Classify intrusion events into categories as defined by security models, such as Cyber Kill Chain Model and Diamond Model of Intrusion
5.11 Describe the relationship of SOC metrics to scope analysis (time to detect, time to
contain, time to respond, time to control)

The course content above may change at any time without notice in order to better reflect the content of the Cisco Certified CyberOps Associate examination.



課堂錄影隨時睇 10 大優點之地點方便:本中心位於旺角、觀塘、北角、沙田及 屯門,就近港鐵站!

更多綜合課程
  攝影課程
  • 攝影初級
  • 攝影中級 (風景專題)
  英文課程
  • IPA 拼音:級別 1 2 3 4
  普通話課程
  • 基礎普通話拼音 (免費)
  • 進階普通話拼音
  • 普通話會話:級別 1 2 3
  西班牙語文課程
  • 級別 1 2 3
  中醫課程
  • 濕疹與皮膚敏感病
  • 暗瘡與色斑 | 鼻敏感與感冒
  • 脫髮與白髮 | 從五官看健康
  風水命理課程
  • 紫微斗數:級別 1 2 3
  • 子平八字:級別 1 2 3
  • 八字風水:級別 1 2 3
  • 奇門遁甲:級別 1 2 3