GB
/
GBP
Image
Filter Events

Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps

WGAC-CSC-CBRFIR

Cisco Training Courses Certification 46a21f4384

Schedule

See all Courses

Description

  • Introducing Incident Response and Forensic Analysis
  • Describing Digital Forensics and Incident Response (DFIR) Guidelines and Associations
  • Examining Threats and Vulnerability Frameworks
  • Describing the Analytical Mindset
  • Preparing for Incident Response and Responding to Threats
  • Identifying Sources of Evidence
  • Gathering Intelligence
  • Examining Digital Forensics and Incident Response Tools
  • Describing Detection and Analysis
  • Describing Investigation and Detection
  • Describing Digital Forensics
  • Describing Breach Containment and Eradication
  • Describing Post-Incident Activities

Before taking this course, you should have:

  • Familiarity with network and endpoint security concepts and monitoring
  • Experience with network intrusion analysis
  • An understanding of security policies and procedures
  • Experience with risk management
  • Experience with traffic and logs analysis
  • Familiarity with APIs
  • 2–3 years’ experience working in a Security Operations Center (SOC) environment (experience Tier 1, or new Tier 2)

Cisco recommends these learning offerings may help students meet these prerequisites:

  • Splunk Fundamentals

After taking this course, you should be able to:

  • Analyze the components needed for a root cause analysis report
  • Apply tools such as YARA for malware identification
  • Recognize the methods identified in the MITRE attack framework
  • Leverage scripting to parse and search logs or multiple data sources such as, Cisco Umbrella, Sourcefire IPS, AMP for Endpoints, AMP for Network, and PX Grid
  • Recommend actions based on post-incident analysis
  • Determine data to correlate based on incident type (host-based and network-based activities)
  • Evaluate alerts from sources such as firewalls, Intrusion Prevention Systems (IPS), data analysis tools (such as, Cisco Umbrella Investigate, Cisco Stealthwatch, and Cisco SecureX), and other systems to responds to cyber incidents and recommend mitigation
  • Evaluate elements required in an incident response playbook and the relevant components from the ThreatGrid report
  • Analyze threat intelligence provided in different formats (such as, STIX and TAXII)

The description for this course is currently being updated.
We use cookies to understand how you use our site and to improve your experience. To learn more, click here. Read our revised Privacy Policy and Terms and Conditions.