Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Lab Topology
Lab Topology
- Explore the Windows Operating System
- Explore the Linux Operating System
- Explore Endpoint Security
- Explore TCP/IP Attacks
- Use NSM Tools to Analyze Data Categories
- Explore Cryptographic Technologies
- Investigate Hacker Methodology
- Investigate Browser-Based Attacks
- Analyze Suspicious DNS Activity
- Explore Security Data for Analysis
- Investigate Suspicious Activity Using Security Onion
- Hunt Malicious Traffic
- Cisco XDR to Splunk Enterprise Integration Simulation
- Correlate Event Logs, PCAPs, and Alerts of an Attack
- Investigate Advanced Persistent Threats
- Explore SOC Playbooks