Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Lab Topology

 

Lab Topology

  • Explore the Windows Operating System
  • Explore the Linux Operating System
  • Explore Endpoint Security
  • Explore TCP/IP Attacks
  • Use NSM Tools to Analyze Data Categories
  • Explore Cryptographic Technologies
  • Investigate Hacker Methodology
  • Investigate Browser-Based Attacks
  • Analyze Suspicious DNS Activity
  • Explore Security Data for Analysis
  • Investigate Suspicious Activity Using Security Onion
  • Hunt Malicious Traffic
  • Cisco XDR to Splunk Enterprise Integration Simulation
  • Correlate Event Logs, PCAPs, and Alerts of an Attack
  • Investigate Advanced Persistent Threats
  • Explore SOC Playbooks