Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lecture
Complete and continue
CCNA Cyber Ops SECOPS 210-255
Introduction
CCNA Cyber Ops SECOPS 210-255: Introduction (1:47)
Lesson 1: Threat Analysis
Learning objectives (0:24)
1.1 Understanding Risk Analysis (3:29)
1.2 Understanding the Common Vulnerability Scoring System (CVSS) (10:10)
1.3 Interpreting Malware Analysis Tool Output (5:26)
Lesson 2: Forensics
Learning objectives (0:34)
2.1 Examining Types of Evidence (7:40)
2.2 Surveying Windows Forensics: Application Processes, Threads, and Vulnerabilities (3:36)
2.3 Surveying Windows Forensics: Memory (5:55)
2.4 Surveying Windows Forensics: The Windows Registry (7:15)
2.5 Surveying Windows Forensics: Hard Drives, FAT, and NTFS (8:17)
2.6 Surveying Linux Forensics (11:18)
2.7 Understanding Evidence Collection (13:48)
2.8 Handling Evidence (4:38)
2.9 Examining Asset and Threat Actor Attribution (5:24)
Lesson 3: Intrusion Analysis
Learning objectives (0:31)
3.1 Introducing Intrusion Analysis Fundamentals (8:12)
3.2 Examining Packet Captures (5:36)
3.3 Examining Protocol Headers (2:18)
3.4 Analyzing Security Device Data (5:22)
3.5 Differentiating False Positives, False Negatives, True Positives, and True Negatives (2:50)
Lesson 4: NetFlow for Cyber Security
Learning objectives (0:34)
4.1 Introducing NetFlow (4:13)
4.2 Comparing NetFlow Versions (2:51)
4.3 Understanding NetFlow for Cyber Security and Incident Response (9:11)
4.4 Examining NetFlow Analysis Tools (9:12)
4.5 Introducing IPFIX (7:23)
Lesson 5: Introduction to Incident Response
Learning objectives (0:25)
5.1 Scoping the Incident Response Plan and Process (11:34)
5.2 Understanding Information Sharing and Coordination (2:54)
5.3 Identifying the Incident Response Team Structure (1:51)
Lesson 6: Incident Response Teams
Learning objectives (0:27)
6.1 Analyzing Computer Incident Response Teams (CSIRTs) (8:25)
6.2 Analyzing Product Security Incident Response Teams (PSIRTs) (10:50)
6.3 Surveying Coordination Centers (3:40)
6.4 Analyzing Managed Security Service Providers Incident Response Teams (3:00)
Lesson 7: Compliance Frameworks
Learning objectives (0:19)
7.1 Considering PCI-DSS (9:03)
7.2 Considering HIPAA (5:25)
7.3 Considering SOX (8:24)
Lesson 8: Network and Host Profiling
Learning objectives (0:18)
8.1 Understanding Network Profiling (7:32)
8.2 Understanding Host Profiling (6:25)
Lesson 9: Data and Event Analysis
Learning objectives (0:34)
9.1 Understanding Data Normalization (3:00)
9.2 Deconstructing Universal Data Formats (3:07)
9.3 Understanding the 5-tuple Correlation (2:09)
9.4 Performing DNS Analysis (1:31)
9.5 Performing Web Log Analysis (4:20)
9.6 Performing Deterministic and Probabilistic Analysis (1:59)
Lesson 10: Intrusion Event Categories
Learning objectives (0:34)
10.1 Identifying and Mitigating Reconnaissance (8:33)
10.2 Identifying and Mitigating Weaponization (2:34)
10.3 Identifying and Mitigating Delivery (2:05)
10.4 Identifying and Mitigating Exploitation (1:02)
10.5 Identifying and Mitigating Installation (2:50)
10.6 Identifying and Mitigating Command and Control (1:39)
10.7 Understanding Action on Objectives (2:18)
Lesson 11: The Incident Handling Process
Learning objectives (0:48)
11.1 Introducing the Vocabulary for Event Recording and Incident Sharing (VERIS) (2:13)
11.2 Applying the VERIS Schema to Incident Handling (4:28)
11.3 Surveying the VERIS Incident Recording Tool and Other VERIS Resources (1:31)
Summary
CCNA Cyber Ops SECOPS 210-255: Summary (1:03)
3.5 Differentiating False Positives, False Negatives, True Positives, and True Negatives
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock