- Level Foundation
- Duration 16 hours
- Course by Cisco Learning and Certifications
-
Offered by
About
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you explore data type categories in context to network security analytics. By the end of the course, you will be able to: • Explain the data that is available to the network security analysis •Describe the various types of data used in monitoring network security • Describe the deployment and use of SIEMs to collect, sort, process, prioritize, store, and report alarms • Describe the functions of SOAR platforms and features of Cisco SecureX •Describe the Security Onion Open Source security monitoring tool • Explain how packet capture data is stored in the PCAP format and the storage requirements for full packet capture. • Describe packet capture usage and benefits for investigating security incidents • Describe packet captures using tools such as Tcpdump • Describe session data content and provide an example of session data •Describe transaction data content and provide an example of transaction data z • Describe alert data content and provide an example of alert data •Describe other types of NSM data (extracted content, statistical data, and metadata) •Explain the need to correlate NSM data and provide an example •Describe the Information Security CIA triad • Understand PII as it relates to information security • Describe compliance regulations and their effects on an organization • Describe intellectual property and the importance of protecting it • Use various tool capabilities of the Security Onion Linux distribution To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.Modules
Lesson Introduction
1
Discussions
- Learner Introduction
1
Videos
- Introduction to Exploring Data Type Categories
1
Readings
- Introduction to Exploring Data Type Categories
Network Security Monitoring Data Types
1
Assignment
- Network Security Monitoring Data Types Practice Quiz
1
Videos
- Network Security Monitoring Data Types
10
Readings
- Session Data
- Full Packet Capture
- Transaction Data
- Extracted Content
- Statistical Data
- Alert Data
- Syslog
- Indicator of Compromise
- Network Time Protocol
- Network Security Monitoring Data Types
Security Information and Event Management Systems
1
Assignment
- Security Information and Event Management Systems Practice Quiz
1
Videos
- Security Information and Event Management Systems
1
Readings
- Security Information and Event Management Systems
Security Orchestration, Automation, and Response
1
Assignment
- Security Orchestration, Automation, and Response Practice Quiz
3
Readings
- Security Orchestration, Automation, and Response
- SOAR Capabilities
- Cisco SecureX Platform
Security Onion Overview
1
Assignment
- Security Onion Overview Practice Quiz
2
Videos
- Security Onion Overview
- Security Onion
3
Readings
- Security Onion Overview
- Deployment Options
- Security Onion Network Security Monitoring Tools
Full Packet Capture
1
Assignment
- Full Packet Capture Practice Quiz
1
Videos
- Full Packet Capture
1
Readings
- Full Packet Capture
Packet Captures
1
Assignment
- Packet Capture Practice Quiz
1
Videos
- Packet Captures
1
Readings
- Packet Captures
Packet Capture Using Tcpdump
1
Assignment
- Packet Capture Using Tcpdump Practice Quiz
1
Videos
- Packet Capture Using Tcpdump
5
Readings
- Packet Capture Using Tcpdump
- Packet Capture Using Tcpdump
- Packet Capture Using Tcpdump (Cont.)
- Tcpdump Command Options
- BPF Syntax Examples
Session Data
1
Assignment
- Session Data Practice Quiz
1
Videos
- Session Data
1
Readings
- Session Data
Transaction Data
1
Assignment
- Transaction Data Practice Quiz
1
Videos
- Transaction Data
1
Readings
- Transaction Data
Alert Data
1
Assignment
- Alert Data Practice Quiz
1
Videos
- Alert Data
1
Readings
- Alert Data
Other Data Types
1
Assignment
- Other Data Types Practice Quiz
1
Videos
- Other Data Types
4
Readings
- Other Data Types
- Extracted Content
- Statistical Data
- Metadata
Correlating NSM Data
1
Assignment
- Correlating NSM Data Practice Quiz
1
Videos
- Correlating NSM Data
1
Readings
- Correlating NSM Data
Information Security Confidentiality, Integrity, and Availability
1
Assignment
- Information Security Confidentiality, Integrity, and Availability Practice Quiz
1
Videos
- Information Security Overview
1
Readings
- Information Security Confidentiality, Integrity, and Availability
Personally Identifiable Information
1
Assignment
- Personally Identifiable Information Practice Quiz
1
Videos
- Personally Identifiable Information
1
Readings
- Personally Identifiable Information
Regulatory Compliance
1
Assignment
- Regulatory Compliance Practice Quiz
1
Videos
- Regulatory Compliance
1
Readings
- Regulatory Compliance
Intellectual Property
1
Assignment
- Intellectual Property Practice Quiz
4
Readings
- Intellectual Property
- Information Assets
- Threat Spectrum
- A Pervasive Security Culture
Wrap-Up
1
Videos
- Wrap-Up
1
Readings
- Wrap-Up
Course Exam
1
Assignment
- Exploring Data Type Categories Course Exam
Introduction
1
Videos
- Introduction to Understanding Basic Cryptography Concepts
2
Readings
- Introduction to Understanding Basic Cryptography Concepts
- Overview of Cryptography
Impact of Cryptography on Security Investigations
1
Assignment
- Impact of Cryptography on Security Investigations Practice Quiz
1
Videos
- Impact of Cryptography on Security Investigations
3
Readings
- Impact of Cryptography on Security Investigations
- Impact of Cryptography on Security Investigations
- Digital Certificates
Cryptography Overview
1
Assignment
- Cryptography Overview Practice Quiz
1
Videos
- Cryptography Overview
3
Readings
- Cryptography Overview
- Cryptography History
- Ciphers for Everyone
Hash Algorithms
1
Assignment
- Hash Algorithms Practice Quiz
1
Videos
- Hash Algorithms
4
Readings
- Hash Algorithms
- Cryptographic Authentication Using Hash Technology
- Cryptographic Authentication in Action
- Comparing Hashing Algorithms
Encryption Overview
1
Assignment
- Encryption Overview Practice Quiz
1
Videos
- Encryption Overview
2
Readings
- Encryption Overview
- Encryption Algorithm Features
Cryptanalysis
1
Assignment
- Cryptanalysis Practice Quiz
1
Videos
- Cryptanalysis
1
Readings
- Cryptanalysis
Symmetric Encryption Algorithms
1
Assignment
- Symmetric Encryption Algorithms Practice Quiz
1
Videos
- Symmetric Encryption Algorithms
3
Readings
- Symmetric Encryption Algorithms
- Symmetric Encryption Key Lengths
- Comparing Symmetric Encryption Algorithms
Asymmetric Encryption Algorithms
1
Assignment
- Asymmetric Encryption Algorithms Practice Quiz
1
Videos
- Asymmetric Encryption Algorithms
1
Readings
- Asymmetric Encryption Algorithms
Diffie-Hellman Key Agreement
1
Assignment
- Diffie-Hellman Key Agreement Practice Quiz
1
Videos
- Diffie-Hellman Key Agreement
1
Readings
- Diffie-Hellman Key Agreement
Use Case: SSH
1
Assignment
- Use Case: SSH Practice Quiz
1
Videos
- Use Case: SSH
1
Readings
- Use Case: SSH
Digital Signatures
1
Assignment
- Digital Signatures Practice Quiz
1
Videos
- Digital Signatures
3
Readings
- Digital Signatures
- RSA Digital Signatures
- Practical Example: Digitally Signed Cisco Software
PKI Overview
1
Assignment
- PKI Overview Practice Quiz
1
Videos
- PKI Overview
5
Readings
- PKI Overview
- Trusted Third-Party Example
- PKI Terminology and Components
- Public-Key Cryptography Standards
- X.509
PKI Operations
1
Assignment
- PKI Operations Practice Quiz
1
Videos
- PKI Operations
5
Readings
- PKI Operations
- Certificate Enrollment
- Authentication Using Certificates
- Certificate Revocation
- Certificate Revocation Check Methods
Use Case: SSL/TLS
1
Assignment
- Use Case: SSL/TLS Practice Quiz
1
Videos
- Use Case: SSL/TLS
3
Readings
- Use Case: SSL/TLS
- SSL/TLS Certificate Example
- Web Browser Security Warnings
Cipher Suite
1
Assignment
- Cipher Suite Practice Quiz
1
Videos
- Cipher Suite
2
Readings
- Cipher Suite
- TLS Cipher Suite Examples
Key Management
1
Assignment
- Key Management Practice Quiz
1
Videos
- Key Management
4
Readings
- Key Management
- Key Management Components
- Key Spaces
- Key Length Issues
NSA Suite B
1
Assignment
- NSA Suite B Practice Quiz
1
Videos
- NSA Suite B
1
Readings
- NSA Suite B
Wrap-Up
1
Videos
- Wrap-Up
1
Readings
- Wrap-Up
Course Exam
1
Assignment
- Understanding Basic Cryptography Concepts Course Exam
Auto Summary
Unlock the essentials of data security with a specialized course designed for associate-level cybersecurity analysts operating in security operation centers. Dive deep into network security analytics and gain the skills to handle various data types crucial for monitoring and protecting networks. Throughout this comprehensive course, you'll master: - Data available for network security analysis. - Types of data used in network security monitoring. - Deployment and utilization of SIEMs to manage alarms. - Functions of SOAR platforms and features of Cisco SecureX. - Security Onion open-source monitoring tools. - Packet capture data storage in PCAP format and its investigative benefits. - Tools like Tcpdump for packet captures. - Session, transaction, and alert data content. - Correlation of NSM data and the Information Security CIA triad. - Understanding and handling PII within information security. - Compliance regulations’ impact and intellectual property protection. - Tool capabilities of the Security Onion Linux distribution. This foundational course, offered by Coursera, spans a duration of 960 hours and is available through flexible subscription options: Starter and Professional. Ideal for those with a background in Cisco Solutions (CCNA), Ethernet and TCP/IP networking, and basic networking security concepts, this course provides a robust framework for enhancing your cybersecurity expertise. Join now to bolster your skills and advance your career in IT and Computer Science with this in-depth Data Security course.

Cisco Learning & Certifications