The course is comprised of twenty-eight (28) modules. Each module is comprised of topics.
- Modules emphasize critical thinking, problem-solving, collaboration, and the practical application of skills.
- Each module contains some way to practice and assess understanding, such as a lab or a Packet Tracer.
These module-level activities provide feedback and are designed to indicate learner’s mastery of the skills needed for the course. Learners can ensure their level of understanding well before taking a graded quiz or exam.
- Some topics may contain a Check Your Understanding interactive quiz, or some other way to assess understanding, such as a lab or a Packet Tracer. These topic-level assessments are designed to tell learners if they have a good grasp of the topic content, or if they need to review before continuing. Learners can ensure their level of understanding well before taking a graded quiz or exam. Check Your Understanding quizzes do not affect the learner’s overall grade.
- Rich multimedia content, including interactive activities, videos, and quizzes, addresses a variety of learning styles and helps stimulate learning and increase knowledge retention.
- Virtual environments simulate real-world cyber security threat scenarios and create opportunities for security monitoring, analysis and resolution.
- Hands-on labs help students develop critical thinking and complex problem-solving skills.
- Innovative assessments provide immediate feedback to support the evaluation of knowledge and acquired skills.
- Technical concepts are explained using language that works well for learners at all levels and embedded interactive activities break up reading of the content and help reinforce understanding.
- The curriculum encourages students to consider additional IT education but also emphasizes applied skills and hands-on experience
- Cisco Packet Tracer activities are designed for use with Packet Tracer 7.3 or later.
Cyber Ops Associate v1.0covers the knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Cyber security Analyst working in a Security Operations Center (SOC). Upon completion of the Cyber Ops Associate v1.0 course, students will be able to perform the following tasks:
- Install virtual machines to create a safe environment for implementing and analyzing cyber security threat events
- Explain the role of the Cyber security Operations Analyst in the enterprise
- Explain the Windows Operating System features and characteristics needed to support cyber security analyses.
- Explain the features and characteristics of the Linux Operating System
- Analyze the operation of network protocols and services.
- Explain the operation of the network infrastructure.
- Classify the various types of network attacks
- Use network monitoring tools to identify attacks against network protocols and services
- Explain how to prevent malicious access to computer networks, hosts, and data.
- Explain the impacts of cryptography on network security monitoring
- Explain how to investigate endpoint vulnerabilities and attacks
- Evaluate network security alerts
- Analyze network intrusion data to identify compromised hosts and vulnerabilities.
- Apply incident response models to manage network security incidents.
Virtual Machine Lab Requirements
This course uses two virtual machines (VM).All labs require a single VM. The lab or student PCs should
meet the following requirements: