CCNA Cyber Ops CBROPS

Cisco-approved eLearning Course for Cisco Certification

Students have 12 months to work at their own pace, and can start at any time of year.

Certified
Leads to Industry certification.

Self-paced course
Online self-paced course.

Flexible
Start any time and work at your own pace.

Learn anywhere
Learn anytime, anywhere.

CCNA Cyber Ops CBROPS

€495

or 3 interest-free payments with Klarna Logo

Course Details

CCNA Cyber Ops CBROPS is designed to prepare learners for roles within Security Operations Centres (SOCs). Developed by Cisco, this course provides the foundational knowledge and skills required to detect, analyse, and respond to cybersecurity threats in real time.

Through a structured learning path, participants will explore core areas of network security, threat intelligence, incident response, and data analysis. The course covers intrusion detection and prevention systems, advanced malware protection, and the use of Cisco security technologies including the Security Management Appliance, Identity Services Engine (ISE), and cloud-based solutions.

Learners will also gain experience with NetFlow data analysis, data loss prevention strategies, and security frameworks such as the CIA triad, the Cyber Kill Chain, MITRE ATT&CK, and the Diamond Model. Additional topics include the handling of personally identifiable and sensitive health information, the use of honeypots and automation within SOCs, and conducting effective risk assessments.

By the end of this course, you will be well-prepared to pass the CBROPS exam and contribute effectively to cybersecurity operations in enterprise environments.

This Cisco eLearning course includes the following features:

  • eLearning resources – exercises, quizzes, flashcards and a glossary
  • Exam study guide – condensed study material on the specific skills objectives you need to master for the exams
  • Video lessons
  • Hands on labs
  • Exam pre-assessment and practice exams
Who should complete this Cisco CCNA eLearning course?
  • Aspiring SOC Analysts: For individuals looking to begin a career in Security Operations Centres, gaining skills in threat detection, incident response, and real-time monitoring.
  • Entry-Level Cybersecurity Professionals: Supports those building a foundation in network security, data analysis, and intrusion detection, using Cisco tools and technologies.
  • IT Technicians Transitioning into Security Roles: Equips IT support or network professionals to move into cybersecurity, learning to handle risk assessments, data protection, and threat intelligence.
  • Students Preparing for Cisco Certification: Provides a structured pathway to pass the CBROPS exam, validating knowledge of security operations, frameworks, and protocols.
  • Compliance and Risk Analysts: Helps professionals involved in data privacy and security policy understand sensitive data handling, including PII and healthcare information, within SOC environments.
Entry Requirements / Prerequisites

How CMIT eLearning Works…

Play
Topics covered in this Cisco CCNA eLearning course
Introduction
  • The Cisco CyberOps Associate Certification
  • The Exam Objectives (Domains)
  • Steps to Pass the Exam
  • Signing Up for the Exam
  • Facts About the Exam
  • About the Cisco CyberOps Associate CBROPS
  • Official Cert Guide
Cybersecurity Fundamentals
  • Introduction to Cybersecurity
  • Threats, Vulnerabilities, and Exploits
  • Network Security Systems
  • Intrusion Detection Systems and Intrusion Prevention Systems
  • Advanced Malware Protection
  • Web Security Appliance
  • Email Security Appliance
  • Cisco Security Management Appliance
  • Cisco Identity Services Engine
  • Security Cloud-Based Solutions
  • Cisco NetFlow
  • Data Loss Prevention
  • The Principles of the Defense-in-Depth Strategy
  • Confidentiality, Integrity, and Availability: The CIA Triad
  • Risk and Risk Analysis
  • Personally Identifiable Information and Protected Health Information
  • Principle of Least Privilege and Separation of Duties
  • Security Operations Centers
  • Playbooks, Runbooks, and Runbook Automation
  • Digital Forensics
  • Review
Introduction to Cloud Computing and Cloud Security
  • Cloud Computing and the Cloud Service Models
  • Cloud Security Responsibility Models
  • DevOps, Continuous Integration (CI), Continuous Delivery (CD), and DevSecOps
  • Understanding the Different Cloud Security Threats
  • Review
Access Control Models
  • Information Security Principles
  • Subject and Object Definition
  • Access Control Fundamentals
  • Access Control Process
  • Information Security Roles and Responsibilities
  • Access Control Types
  • Access Control Models
  • Access Control Mechanisms
  • Identity and Access Control Implementation
  • Review
Types of Attacks and Vulnerabilities
  • Types of Attacks
  • Types of Vulnerabilities
  • Review
Fundamentals of Cryptography and Public Key Infrastructure (PKI)
  • Cryptography
  • Block and Stream Ciphers
  • Symmetric and Asymmetric Algorithms
  • Hashes
  • Digital Signatures
  • Next-Generation Encryption Protocols
  • IPsec and SSL/TLS
  • Fundamentals of PKI
  • Root and Identity Certificates
  • Revoking Digital Certificates
  • Using Digital Certificates
  • Review
Introduction to Virtual Private Networks (VPNs)
  • What Are VPNs?
  • Site-to-Site vs. Remote-Access VPNs
  • An Overview of IPsec
  • SSL VPNs
  • Review
Introduction to Security Operations Management
  • Introduction to Identity and Access Management
  • Security Events and Log Management
  • Asset Management
  • Introduction to Enterprise Mobility Management
  • Configuration and Change Management
  • Vulnerability Management
  • Patch Management
  • Review
Fundamentals of Intrusion Analysis
  • Introduction to Incident Response
  • The Incident Response Plan
  • The Incident Response Process
  • Information Sharing and Coordination
  • Incident Response Team Structure
  • Common Artifact Elements and Sources of Security Events
  • Understanding Regular Expressions
  • Protocols, Protocol Headers, and Intrusion Analysis
  • How to Map Security Event Types to Source Technologies
  • Review
Introduction to Digital Forensics
  • Introduction to Digital Forensics
  • The Role of Attribution in a Cybersecurity Investigation
  • The Use of Digital Evidence Evidentiary
  • Chain of Custody
  • Reverse Engineering
  • Fundamentals of Microsoft Windows Forensics
  • Fundamentals of Linux Forensics
  • Review
Network Infrastructure Device Telemetry and Analysis
  • Network Infrastructure Logs
  • Traditional Firewall Logs
  • NetFlow Analysis
  • Network Packet Capture
  • Network Profiling
  • Review
Endpoint Telemetry and Analysis
  • Understanding Host Telemetry
  • Host Profiling
  • Analysing Windows Endpoints
  • Linux and macOS Analysis
  • Endpoint Security Technologies
  • Review
Challenges in the Security Operations Center (SOC)
  • Security Monitoring Challenges in the SOC
  • Additional Evasion and Obfuscation Techniques
  • Review
The Art of Data and Event Analysis
  • Normalizing Data
  • Using the 5-Tuple Correlation to Respond to Security Incidents
  • Using Retrospective Analysis and Identifying Malicious Files
  • Mapping Threat Intelligence with DNS and Other Artifacts
  • Using Deterministic Versus Probabilistic Analysis
  • Review
Classifying Intrusion Events into Categories
  • Diamond Model of Intrusion
  • Cyber Kill Chain Model
  • The Kill Chain vs. MITRE’s ATT&CK
  • Review
Introduction to Threat Hunting
  • What Is Threat Hunting?
  • The Threat-Hunting Process
  • Threat Hunting and MITRE’s ATT&CK
  • Threat-Hunting Case Study
  • Threat Hunting, Honeypots, Honeynets, and Active Defense

 

Assessment
  • Once you successfully pass the programme(s), you will be able to download a CMIT Digital Certificate of Completion.
  • You may optionally take exams to receive certification. Exam fees are not included in the course price. More information on exams can be found on the CMIT exam page.
  • More information on accreditation can be found on the CMIT Accreditation Details page.

Request Prospectus

Complete the form below to request a prospectus.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
This field is hidden when viewing the form
Opt in

Student Reviews of this course

0.0
0.0 out of 5 stars (based on 0 reviews)
Excellent0%
Very good0%
Average0%
Poor0%
Terrible0%

There are no reviews yet. Be the first one to write one.

Request A Prospectus

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
This field is hidden when viewing the form
Opt in
College of Management and IT (CMIT)
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Click here to view our Privacy Policy