• Skip to primary navigation
  • Skip to content
  • Skip to footer
 AREA RISERVATA
 800-177596
 CHI SIAMO
 CONTATTACI
 AREA RISERVATA
 CONTATTACI
 800-177596

Vega Training

Vega Training

Formazione Certificata Ovunque

  • Corsi
  • Corsi per Tecnologia
  • Corsi per Vendor
    • Amazon AWS
    • Microsoft Azure
    • Alibaba Cloud
    • Google Cloud
    • VMware
    • CompTIA
    • Cisco
    • Check Point
    • Fortinet
    • Huawei
  • Certificazioni
  • Calendario

Certificazione Cisco CyberOps Professional 300-215 CBRFIR

Cisco CCNA Security, Cisco CCNA Cyber OPS, Cisco CCNP Security

Certificazione Cisco CyberOps Professional 300-215 CBRFIR

Panoramica | Svolgimento e Durata | Prerequisiti
Argomenti D’esame   |  Corsi Propedeutici

Panoramica   Svolgimento e Durata
Prerequisiti
Argomenti D’esame    Corsi Propedeutici

PANORAMICA

Corso e Certificazione Cisco CyberOPS Professional

Esame 300-730 CBRFIR;
Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps;
Tipo Esame: Concentration;
Cisco Certified Specialist – CyberOps Forensic Analysis and Incident Response;
Esame Parte della Certificazione CyberOps Professional;

Il nuovo programma di certificazione Cisco CyberOps Professional prepara per i ruoli professionali Senior di Security operations analyst, Security incident responder e Forensic analyst all’interno di centri operativi di sicurezza (SOC). Naturale evoluzione della Certificazione Cisco CyberOps Associate, questa certificazione è indirizzata a figure professionali con alcuni anni di esperienza nelle tematiche di sicurezza legate alle infrastrutture di rete complesse. In particolare l’esame 300-215 CBRFIR testa competenze su argomenti quali: forensics analysis, antiforensic, YARA rules, DFIR investigations, malware analysis, process analysis, Python, PowerShell, and Bash scripts, Volatility, Systernals, SIFT tools, TCPdump, post-incident analysis, Interpret threat intelligence data, Analyze network traffic, ThreatGrid report, Analyze threat intelligence e altro ancora.

Esame 300-215 CBRFIR;
Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps;
Tipo Esame: Concentration;
Cisco Certified Specialist – CyberOps Forensic Analysis and Incident Response;
Esame Parte della Certificazione CyberOps Professional;

Corsi propedeutici alla certificazione

CORSI PROPEDEUTICI
Affrontare un esame di certificazione richiede una preparazione specifica.
Per questa certificazione consigliamo:

Corso CyberOps Professional CBRFIR – Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR)

 SVOLGIMENTO E DURATA

Esame 300-215 CBRFIR –> Durata 90 minuti;

Negli esami sono presenti quesiti formulati in lingua inglese in forme differenti: Risposta Multipla; completamento di testo, collegamenti concettuali Drag and Drop; vere e proprie simulazioni laboratoriali.

 PREREQUISITI

Non ci sono prerequisiti formali. Si consiglia il possesso della Certificazione Cisco CyberOps Associate.

ARGOMENTI D’ESAME

Esame 300-215 CBRFIR Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies

  • Analyze the components needed for a root cause analysis report
  • Describe the process of performing forensics analysis of infrastructure network devices
  • Describe antiforensic tactics, techniques, and procedures
  • Recognize encoding and obfuscation techniques (such as, base 64 and hex encoding)
  • Describe the use and characteristics of YARA rules (basics) for malware identification, classification, and documentation
  • Describe the role of:
  • hex editors (HxD, Hiew, and Hexfiend) in DFIR investigations
  • disassemblers and debuggers (such as, Ghidra, Radare, and Evans Debugger) to perform basic malware analysis
  • deobfuscation tools (such as, XORBruteForces, xortool, and unpacker)
  • Describe the issues related to gathering evidence from virtualized environments (major cloud vendors)
  • Recognize the methods identified in the MITRE attack framework to perform fileless malware analysis
  • Determine the files needed and their location on the host
  • Evaluate output(s) to identify IOC on a host
  • process analysis
  • log analysis
  • Determine the type of code based on a provided snippet
  • Construct Python, PowerShell, and Bash scripts to parse and search logs or multiple data sources (such as, Cisco Umbrella, Sourcefire IPS, AMP for Endpoints, AMP for Network, and PX Grid)
  • Recognize purpose, use, and functionality of libraries and tools (such as, Volatility, Systernals, SIFT tools, and TCPdump)
  • Interpret alert logs (such as, IDS/IPS and syslogs)
  • Determine data to correlate based on incident type (host-based and network-based activities)
  • Determine attack vectors or attack surface and recommend mitigation in a given scenario
  • Recommend actions based on post-incident analysis
  • Recommend mitigation techniques for evaluated alerts from firewalls, intrusion prevention systems (IPS), data analysis tools (such as, Cisco Umbrella Investigate, Cisco Stealthwatch, and Cisco SecureX), and other systems to responds to cyber incidents
  • Recommend a response to 0 day exploitations (vulnerability management)
  • Recommend a response based on intelligence artifacts
  • Recommend the Cisco security solution for detection and prevention, given a scenario
  • Interpret threat intelligence data to determine IOC and IOA (internal and external sources)
  • Evaluate artifacts from threat intelligence to determine the threat actor profile
  • Describe capabilities of Cisco security solutions related to threat intelligence (such as, Cisco Umbrella, Sourcefire IPS, AMP for Endpoints, and AMP for Network)
  • Describe antiforensic techniques (such as, debugging, Geo location, and obfuscation)
  • Analyze logs from modern web applications and servers (Apache and NGINX)
  • Analyze network traffic associated with malicious activities using network monitoring tools (such as, NetFlow and display filtering in Wireshark)
  • Recommend next step(s) in the process of evaluating files based on distinguished characteristics of files in a given scenario
  • Interpret binaries using objdump and other CLI tools (such as, Linux, Python, and Bash)
  • Describe the goals of incident response
  • Evaluate elements required in an incident response playbook
  • Evaluate the relevant components from the ThreatGrid report
  • Recommend next step(s) in the process of evaluating files from endpoints and performing ad-hoc scans in a given scenario
  • Analyze threat intelligence provided in different formats (such as, STIX and TAXII)

 CORSI PROPEDEUTICI

Corso CyberOps Professional CBRFIR – Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR);

CONTATTACI
UN NOSTRO CONSULENTE
TECNICO

Servizio attivo dal lunedì al giovedì 09.00-13.00 e 15.00-19.00 e Il venerdì dalle 09.00-13.00.

FORMAZIONE A DISTANZA

APPROFONDISCI

FORMAZIONE AZIENDALE

APPROFONDISCI

LABORATORIO LAVORO

APPROFONDISCI

LABORATORIO REMOTO

APPROFONDISCI

RICHIEDI CONSULENZA

APPROFONDISCI
ALTRE CERTIFICAZIONI
Continuing Education
Cisco CCNA
DevNet Associate
CyberOps Associate
Meraki Specialist
CyberOps Professional
CCNP Enterprise
CCNP Collaboration
CCNP Data Center
CCNP Security
CCNP Service Provider
DevNet Professional
Altre Certificazioni

Footer

CHI SIAMO


Formazione Aziendale
Formazione a Distanza
Laboratorio Remoto
Casi di successo
Partner e convenzioni
Marketplace
About Vega Training

DIRITTI E PRIVACY


Privacy
Cookie
ISO 9001
Contatti

QUICK LINKS


Corsi Cisco
Corsi Check Point
Corsi Fortinet
Corsi Huawei
Corsi Microsoft
Corsi Google Cloud
Corsi Alibaba Cloud
Corsi VMware
Corsi CompTIA

CONTATTI



Dall’estero: +39 02 87168254
[email protected]

Trustpilot

Vega Training® SRL - Piva: 01985170743 - Copyright 2022