Course: CCNA Cyber Ops - SECOPS - Implementing Cisco Cybersecurity Operations ( exam 210-255)

As low as

$519.09 incl. vat

1 x Course: CCNA Cyber Ops - SECOPS - Implementing Cisco Cybersecurity Operations ( exam 210-255)   +
$519.09 incl. vat

$519.09 incl. vat

duration: 35 hours |

Language: English (US) |

access duration: 180 days

In this online Cisco Cyber Ops - SECOPS training you will learn the skills and knowledge needed to get started as a Security Operations Center (SOC) Analyst at associate level.

You learn in particular to gain insight into basic threat analyzes, event correlation, the identification of harmful activities and the use of a playbook for incident response.


You are familiar with the security concepts and the security techniques used in a Security Operations Center (SOC). You are fully prepared for the Cisco exam 210-255.


It is a big plus to have the following:

  • Skills and knowledge equivalent to those learned in Interconnecting Cisco Networking Devices, Part 1 (ICND1)
  • Skills and knowledge equivalent to those learned in Understanding Cisco Cybersecurity Fundamentals (SECFND)
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts

Target audience

Network Administrator, Security Specialist

CCNA Cyber Ops - SECOPS - Implementing Cisco Cybersecurity Operations ( exam 210-255)

35 hours

SECOPS: Analyzing Threat Mitigation Reports

Course_Description=<p>Explore the processes involved in Cisco threat mitigation reporting and how to analyze these reports. Discover features of Cisco's AMP ThreadGRID Suite, including dynamic analysis, network file trajectory, and security intelligence events.</p> TargetAudience= Duration=01:32

SECOPS: Scoring with CVSS 3.0

Course_Description=<p>Explore the CVSS 3.0 scoring system, how to calculate scores, and scoring metrics. Calculating a base score using exploitability metrics and working with impact metrics are also covered.</p> TargetAudience= Duration=01:31

SECOPS: Securing File Systems

Course_Description=<p>Discover the importance of file system security by looking at file systems supported by the Windows and Linux operating systems. File system forensics, alternate data streams, and timestamps are also covered.</p> TargetAudience= Duration=01:16

SECOPS: Identifying Forensic Evidence

Course_Description=<p>Examine the importance of being able to identify, handle, and process digital forensic evidence. Learn about computer forensics, chain of custody, and order of volatility, as well as various evidence types.</p> TargetAudience= Duration=01:06

SECOPS: Interpreting Regular Expressions

Course_Description=<p>Explore the process of interpreting regular expressions and refresh your knowledge of RegEx functions and operators. Filter Cisco router configuration output and transitioning to Wireshark to filter conversations is also covered.</p> TargetAudience= Duration=00:59

SECOPS: Protocol Header Security

Course_Description=<p>Discover the important roles protocol headers and their components play in security. How to analyze common Layer 2 security attacks is also covered.</p> TargetAudience= Duration=01:28

SECOPS: IP Header Security

Course_Description=<p>Discover the important role IP headers and their components play in security. Examine security concerns associated with IP header components.</p> TargetAudience= Duration=01:23

SECOPS: ICMP Intrusion

Course_Description=<p>Discover the importance of ICMP from a security standpoint by reviewing the purpose of ICMP, ICMP types, and header information. Analyzing a packet capture of a ping sweep and recognizing attack vectors is also covered.</p> TargetAudience= Duration=00:57

SECOPS: ICMP Intrusion Part 2

Course_Description=<p>Examine additional ICMP security considerations by exploring attacks like firewalking, OS fingerprinting, ICMP route redirects, router discovery spoofing, and Denial of Service.</p> TargetAudience= Duration=00:53

SECOPS: Transport Layer Headers

Course_Description=<p>Explore transport layer headers, including basic operations, 3-way handshake, header fields, session hijacking, TCP checksums, invalid TCP flag combinations, UDP flooding, and UDP max length.</p> TargetAudience= Duration=01:15


Course_Description=<p>Examine HTTP headers, including a review of the basics, the GET, POST, and HTTP methods, and HEAD. Cookies and their components, double encoding, and common characters used in web attacks are also covered.</p> TargetAudience= Duration=01:15

SECOPS: Identifying NetFlow v5 Records

Course_Description=<p>Discover the NetFlow tool and how to identify elements of a security event. Working with flow records, and using StealthWatch is also covered.</p> TargetAudience= Duration=00:56

SECOPS: Examining Intrusion Events

Course_Description=<p>Explore how to interrupt common artifact elements from an event to identify an alert, identify key intrusion elements from a PCAP file, extract files from a TCP stream given a PCAP file, and work with Wireshark.</p> TargetAudience= Duration=00:22

SECOPS: Intrusion Event Technologies

Course_Description=<p>Examine intrusion event technologies, including NetFlow, StealthWatch, and Cisco Firepower Management Center. Alert data, NGFW, packet capture, network application control, and Cisco ISE are also covered.</p> TargetAudience= Duration=01:15

SECOPS: Analyzing Intrusion Impact

Course_Description=<p>Discover how to analyze the impact of intrusion and explore the concept of heuristics. Walk through how to interpret a provided event and explore the use of Firepower Management Center.</p> TargetAudience= Duration=00:59

SECOPS: Responding to Incidents

Course_Description=<p>Explore incident response plans, including the elements required by NIST.SP800-61 r2. Discover how to link plan elements to analysis steps, and determine which stakeholders belong in each analysis category.</p> <p> </p> TargetAudience= Duration=01:00

SECOPS: CSIRT Goals and Cybersec Elements

Course_Description=<p>Discover the concept of CSIRT and its associated goals. Examine how to link data types to compliance frameworks, such as PCI, HIPPA, and SOX, and identify required protected elements for PCI-DSS.</p> TargetAudience= Duration=00:53

SECOPS: Data Normalization and 5-Tuple Correlation

Course_Description=<p>Explore the concept of data normalization and why it should be used. Discover 5-Tuple, how it correlates in events, and how it can be used to identify compromised hosts in logs.</p> TargetAudience= Duration=00:33

SECOPS: Firepower Management Console and Analysis Methods

Course_Description=<p>Explore how to use the Firepower Management Console to examine threat analysis reports and identify possible compromised hosts. Compare and contrast deterministic and probabilistic analysis methods.</p> TargetAudience= Duration=00:51

SECOPS: Categorize and Classify Intrusions

Course_Description=<p>Discover the Diamond Model of Intrusion Analysis, how it can be used to handle events, and how it can be used in conjunction with Kill Chain for a complete security intelligence model.</p> TargetAudience= Duration=01:08

SECOPS: Handling Incident Events and Evidence

Course_Description=<p>Explore how NIST SP800-61 r2 is used to process an incident event and the recommended incident handling process. Examine evidence handling, as documented in NIST SP800-86 and how to apply VERIS schema categories to incident handling events.</p> TargetAudience= Duration=01:18

We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.

Optional practice exam (trial exam)

To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam. 

Optional practice lab

To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediatelyThe lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience. 


Via ons opleidingsconcept bespaar je tot 80% op trainingen

Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo

Spar met medecursisten en profileer je als autoriteit in je vakgebied.

Ontvang na succesvolle afronding van je cursus het officiële certificaat van

Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers

Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten


Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.

frequently asked quesions

What is included?

Duration 35 hours
Language English (US)
Certificate of participation Yes
Online access 180 days
Monitor Progress Yes
Award Winning E-learning Yes
Mobile ready Yes

Also included in world's #1 eLearning portal

Sharing knowledge Unlimited access to our IT professionals community
Study advice Our consultants are here for you to advice about your study career and options
Study materials Certified teachers with in depth knowledge about the subject.
Platform Access to our platform.
Service World's best service

Life Long Learning

Follow multiple courses? Read more about our Life Long Learning concept

read more

Contact us

Need training advise? Contact us!