Home > Store

CCNA Cyber Ops SECOPS 210-255 Complete Video Course and Practice Test

Register your product to gain access to bonus material or receive a coupon.

CCNA Cyber Ops SECOPS 210-255 Complete Video Course and Practice Test

Premium Edition Video

  • Your Price: $159.99
  • List Price: $199.99
  • Estimated Release: May 27, 2017
  • About this video
  • The Premium Edition Video is a digital-only certification preparation product combining a video course with enhanced Pearson IT Certification Practice Tests.

    Your purchase will deliver:

    • Link to download the enhanced Pearson IT Certification Practice Test exam engine
    • Access code for question database
    • Access to the streaming video through your Account page after purchase


  • Copyright 2017
  • Edition: 1st
  • Premium Edition Video
  • ISBN-10: 0-13-466109-5
  • ISBN-13: 978-0-13-466109-4


More than nine hours of video instruction on configuration and troubleshooting tasks to prepare you for the Cisco CCNA Cyber Ops SECOPS 210-255 certification exam.


CCNA Cyber Ops SECOPS 210-255 LiveLessons is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-255 SECOPS exam. This product walks through each topic of the Implementing Cisco Cybersecurity Operations exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as a Security Operations Center (SOC) Security Analyst.

CCNA Cyber Ops SECOPS 210-255 contains more than nine hours of instruction with 11 lessons. The videos consist of live video training, video screencasts, and demos. Video instruction throughout offers detailed explanations, tips, and design recommendations. The Complete Video Couse Premium Edition also comes with:

·         Lesson quizzes to help you test yourself on concepts and commands
·         Interactive exercises so you can put your knowledge to the test
·         A full practice exam delivered in the Pearson Test Prep Engine

Major topics include:

  • Endpoint Threat Analysis and Computer Forensics

  • Network Intrusion Analysis

  • Incident Response

  • Data and Event Analysis

  • Incident Handling

Skill Level

  • Beginning to intermediate

What You Will Learn

  • Presents real-world solutions for understand Cisco's threat analysis and incident response solution

  • Covers all of the objectives in the CCNA Cyber Ops exam

  • Easy to follow demonstrations of cybersecurity tools, products, and solutions

  • Scenarios offered to help learners understand real-world applications

Who Should Take This Course

Anyone who wants to obtain their CCNA Cyber Ops certification. This includes security professionals interested in learning how to develop, manage, or improve a security operations center, a CSIRT, PSIRT, or to become a cyber security incident response expert. Anyone wishing to take the CCNA CyberOps exam would also benefit from viewing this course.

Course Requirements

The video course assumes that the learner has the skills to navigate the user interface of a PC running Windows, Mac or Linux and who has completed typical high school-level math courses (mainly that the reader has been exposed to binary math). The course also assumes that the reader has used PCs connected to either a home network or a network inside a school or company, but that the reader might not understand anything about the network to which the PC was connected. It is also assumes that the reader knows how to use typical Internet applications, primarily web browsers and email clients.

Sample Content

Table of Contents

Lesson 1:  Threat Analysis

1.1: Understanding Risk Analysis

1.2: Understanding the Common Vulnerability Scoring System (CVSS)

1.3: Interpreting Malware Analysis Tool Output

Lesson 2:  Forensics

2.1: Examining Types of Evidence

2.2: Surveying Windows Forensics

2.3: Surveying Linux Forensics

2.4: Understanding Evidence Collection

2.5: Handling Evidence

2.6: Examining Asset and Threat Actor Attribution

Lesson 3:  Intrusion Analysis

3.1: Introducing Intrusion Analysis Fundamentals

3.2: Examining Packet Captures

3.3: Examining Protocol Headers

3.4: Analyzing Security Device Data

3.5: Differentiating False Positives, False Negatives, True Positives, and True Negatives

3.6: Surveying Cisco Firepower Management Center (FMC) Analysis and Reporting

Lesson 4:  NetFlow for Cyber Security

4.1: Introducing NetFlow

4.2: Comparing NetFlow Versions

4.3: Understanding NetFlow for Cyber Security and Incident Response

4.4: Examining NetFlow Analysis Tools

4.5: Introducing IPFIX

Lesson 5:  Introduction to Incident Response

5.1: Scoping the Incident Response Plan and Process

5.2: Understanding Information Sharing and Coordination

5.3: Identifying the Incident Response Team Structure

Lesson 6:  Incident Response Teams

6.1: Analyzing Computer Incident Response Teams (CSIRTs)

6.2: Analyzing Product Security Incident Response Teams (PSIRTs)

6.3: Surveying Coordination Centers

6.4: Surveying Analysis Centers

6.4: Analyzing Managed Security Service Providers Incident Response Teams

Lesson 7:  Compliance Frameworks

7.1: Considering PCI-DSS

7.2: Considering HIPAA

7.3: Considering SOX

Lesson 8:  Network and Host Profiling

8.1: Understanding Network Profiling

8.2: Understanding Host Profiling

Lesson 9:  Data and Event Analysis

9.1: Understanding Data Normalization

9.2: Deconstructing Universal Data Formats

9.3: Understanding the 5-tuple Correlation

9.4: Performing DNS Analysis

9.5: Performing Web Log Analysis

9.6: Performing Deterministic and Probabilistic Analysis

Lesson 10:  Intrusion Event Categories

10.1: Identifying and Mitigating Reconnaissance

10.2: Identifying and Mitigating Weaponization

10.3: Identifying and Mitigating Delivery

10.4: Identifying and Mitigating Exploitation

10.5: Identifying and Mitigating Installation

10.6: Identifying and Mitigating Command and Control

10.7: Understanding Action on Objectives

Lesson 11:  The Incident Handling Process

11.1: Introduction to the NIST SP800-61 Incident Handling Process

11.2: Performing

Lessons-based Hardening

11.3: Performing Incident Reporting

11.4: Understanding Evidence Collection Orders

11.5: Preserving Data Integrity

11.6: Ensuring Data Preservation

11.7: Considering Volatile Data Collection

11.8: Applying the VERIS Schema Categories to a Given Incident


Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership