By browsing this site, you agree to the use of cookies, which enhance your experience, analyze how you integrate with our site and customize our content to your personal needs and search. Saiba mais
0
Español
English
Select country:
Antigua & Barbuda
Argentina
Bahamas
Barbados
Belize
Bolivia
Brazil
Chile
Colombia
Costa Rica
Cuba
Dominica
Dominican Republic
Ecuador
El Salvador
Grenada
Guatemala
Guyana
Honduras
Jamaica
Mexico
Nicaragua
Panama
Paraguay
Peru
Puerto Rico
Saint Kitts & Nevis
Saint Lucia
Saint Vincent & Grenadines
Suriname
Trinidad & Tobago
Uruguay
Venezuela
Albania
Austria
Belgium
Bosnia & Herzegovina
Bulgaria
Croatia
Cyprus
Czech Republic
Denmark
Estonia
Finland
France
Germany
Greece
Hungary
Iceland
Ireland
Italy
Latvia
Lithuania
Luxembourg
Malta
Montenegro
Netherlands
North Macedonia
Norway
Poland
Portugal
Romania
Serbia
Slovakia
Slovenia
Spain
Sweden
Switzerland
Turkey
Ukraine
United Kingdom
Canada
United States
Australia
Cambodia
China
Hong Kong
India
Indonesia
Japan
Malaysia
Micronesia
New Zealand
Pakistan
Philippines
Singapore
South Korea
Taiwan
Thailand
Vietnam
Bahrain
Iran
Iraq
Israel
Jordan
Kuwait
Lebanon
Oman
Qatar
Saudi Arabia
Syria
United Arab Emirates
Algeria
Egypt
Kenya
Morocco
Nigeria
Senegal
South Africa
Sudan
Tunisia
Ficaremos felizes em atendê-lo!
Contato
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) – Outline
Outline detalhado do curso
Defining the Security Operations Center Understanding Network Infrastructure and Network Security Monitoring Tools Exploring Data Type Categories Understanding Basic Cryptography Concepts Understanding Common TCP/IP Attacks Understanding Endpoint Security Technologies Understanding Incident Analysis in a Threat-Centric SOC Identifying Resources for Hunting Cyber Threats Understanding Event Correlation and Normalization Identifying Common Attack Vectors Identifying Malicious Activity Identifying Patterns of Suspicious Behavior Conducting Security Incident Investigations Using a Playbook Model to Organize Security Monitoring Understanding SOC Metrics Understanding SOC Workflow and Automation Describing Incident Response Understanding the Use of VERIS Understanding Windows Operating System Basics Understanding Linux Operating System Basics