Cisco Cybersecurity Certifications - CyberOps Professional
1 Introduction to CyberOps
1-1 Understanding CyberOps
1-2 Role of a CyberOps Analyst
1-3 CyberOps Professional Certification Overview
2 Cyber Threat Landscape
2-1 Types of Cyber Threats
2-2 Threat Actors and Motives
2-3 Threat Intelligence Sources
3 Network Fundamentals
3-1 OSI and TCPIP Models
3-2 Network Devices and Their Functions
3-3 Network Addressing (IP, MAC)
3-4 Subnetting and VLANs
4 Security Fundamentals
4-1 CIA Triad (Confidentiality, Integrity, Availability)
4-2 Security Policies and Procedures
4-3 Risk Management and Mitigation
5 Network Security Devices
5-1 Firewalls
5-2 Intrusion Detection Systems (IDS)
5-3 Intrusion Prevention Systems (IPS)
5-4 Next-Generation Firewalls (NGFW)
6 Security Information and Event Management (SIEM)
6-1 SIEM Architecture and Components
6-2 Log Management and Analysis
6-3 Correlation Rules and Alerts
6-4 Reporting and Dashboards
7 Incident Response
7-1 Incident Response Process (IRP)
7-2 Preparation and Detection
7-3 Containment, Eradication, and Recovery
7-4 Post-Incident Activity and Lessons Learned
8 Threat Hunting
8-1 Threat Hunting Concepts
8-2 Threat Hunting Techniques
8-3 Tools and Platforms for Threat Hunting
8-4 Case Studies and Real-World Scenarios
9 Malware Analysis
9-1 Types of Malware
9-2 Malware Analysis Techniques
9-3 Tools for Malware Analysis
9-4 Case Studies and Real-World Scenarios
10 Cloud Security
10-1 Cloud Security Concepts
10-2 Cloud Security Models (IaaS, PaaS, SaaS)
10-3 Cloud Security Best Practices
10-4 Cloud Security Tools and Platforms
11 Automation and Orchestration
11-1 Automation Concepts in CyberOps
11-2 Orchestration Tools and Platforms
11-3 Use Cases for Automation and Orchestration
11-4 Security Automation Best Practices
12 CyberOps Professional Capstone Project
12-1 Project Planning and Requirements
12-2 Implementation and Execution
12-3 Testing and Validation
12-4 Documentation and Presentation
Network Fundamentals

Network Fundamentals

1. IP Addressing

IP Addressing is the method by which devices on a network are identified and located. An IP address is a unique identifier assigned to each device connected to a network, allowing them to communicate with each other. There are two main versions of IP addressing: IPv4 and IPv6.

IPv4 uses a 32-bit address format, represented as four decimal numbers separated by dots (e.g., 192.168.1.1). IPv6, on the other hand, uses a 128-bit address format, represented as eight groups of four hexadecimal digits separated by colons (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).

Analogy: Think of an IP address as a postal address for a house. Just as a postal address helps mail reach the correct house, an IP address helps data packets reach the correct device on a network.

2. Subnetting

Subnetting is the process of dividing a network into smaller, more manageable subnetworks, or subnets. This is done by borrowing bits from the host portion of an IP address to create a subnet mask. Subnetting helps in optimizing network performance, improving security, and reducing network congestion.

For example, a Class C network (e.g., 192.168.1.0) with a default subnet mask of 255.255.255.0 can be subnetted into multiple subnets by borrowing bits from the host portion. If you borrow 3 bits, the new subnet mask would be 255.255.255.224, resulting in 8 subnets with 30 usable host addresses each.

Analogy: Subnetting is like dividing a large city into smaller neighborhoods. Each neighborhood (subnet) has its own set of houses (devices), making it easier to manage and secure the city as a whole.

3. Routing

Routing is the process of selecting paths in a network along which to send network traffic. Routers are devices that use routing tables to determine the best path for data packets to travel from the source to the destination. Routing is essential for connecting different networks together, such as connecting a home network to the internet.

For instance, when you send an email from your home computer to a friend's computer in another country, the data packets travel through multiple routers, each making decisions based on the routing table to ensure the packets reach their destination efficiently.

Analogy: Routing is like navigating a road trip. Just as a GPS device helps you choose the best route to reach your destination, routers help data packets find the best path through a network to reach their destination.