Programme Overview

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)

Duration: 5 days
Level: 2
Program Code: B422
Exam Code: 200-201
Price Includes SST
Write your awesome label here.

Programme Overview

The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents.  Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a Cybersecurity Operations Center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. This course also earns you 30 Continuing Education (CE) credits towards recertification. 

Who Should Attend?

This course is designed for individuals seeking a role as an associate-level cybersecurity analyst and IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including:

  • Students pursuing a technical degree
  • Current IT professionals
  • Recent college graduates with a technical degree


Before taking this course, you should have the following knowledge and skills: 
  • Familiarity with Ethernet and TCP/IP networking 
  • Working knowledge of the Windows and Linux operating systems 
  • Familiarity with basics of networking security concepts 

Delivery Methods

Instructor Led Blended Learning (online and classroom)

Learning Outcomes

By the end of the program, participants will be able to:
  • Explain the data that is available to the network security analyst. 
  • Describe the basic concepts and uses of cryptography. 
  • Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts. 
  • Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective. 
  • Explain Network Security Monitoring (NSM) tools that are available to the network security analyst. 

Course Content


  • Defining the Security Operations Center
  • Understanding Network Infrastructure and Network Security Monitoring Tools
  • Exploring Data Type Categories
  • Understanding Basic Cryptography Concepts
  • Understanding Common TCP/IP Attacks
  • Understanding Endpoint Security Technologies
  • Understanding Incident Analysis in a Threat-Centric SOC
  • Identifying Resources for Hunting Cyber Threats
  • Understanding Event Correlation and Normalization
  • Identifying Common Attack Vectors
  • Identifying Malicious Activity
  • Identifying Patterns of Suspicious Behavior
  • Conducting Security Incident Investigations
  • Using a Playbook Model to Organize Security Monitoring
  • Understanding SOC Metrics
  • Understanding SOC Workflow and Automation
  • Describing Incident Response
  • Understanding the Use of VERIS
  • Understanding Windows Operating System Basics
  • Understanding Linux Operating System Basics

Lab Outline

  • Use NSM Tools to Analyze Data Categories
  • Explore Cryptographic Technologies
  • Explore TCP/IP Attacks
  • Explore Endpoint Security
  • Investigate Hacker Methodology
  • Hunt Malicious Traffic
  • Correlate Event Logs, Packet Captures (PCAPs), and Alerts of an Attack
  • Investigate Browser-Based Attacks
  • Analyze Suspicious Domain Name System (DNS) Activity
  • Explore Security Data for Analysis
  • Investigate Suspicious Activity Using Security Onion
  • Investigate Advanced Persistent Threats
  • Explore SOC Playbooks
  • Explore the Windows Operating System
  • Explore the Linux Operating System
  • Certification

    Certification Body
    Understanding Cisco Cybersecurity Operations Fundamentals


    Trainer/ Consultant
    Academic Qualification:

    • 2005 - Masters in Business Administration (MBA), IIU
    • 2000 - Bachelor of Science, University Putra Malaysia (UPM)

    Professional Certification:

      • CompTIA Network+
      • CompTIA Security+
      • CompTIA CySA+
      • Certified IPv6 Engineer - (CNE6)
      • ITIL (V3)
      • Cisco Certified Network Professional (CCNP)
      • Cisco Certified Network Associate (CCNA)
      • Microsoft Certified Professional (MCP)
      • Microsoft Certified Solutions Associate (MCSA)
      • Microsoft Specialist: Azure
      • Microsoft Specialist: Design & Deployment MS Exchange 2016
      • Microsoft Certified Solutions Expert: Messaging
      • Microsoft Certified Solutions Expert: Productivity
      • Microsoft Certified Solutions Expert: Cloud Platform & Infrastructure (*Charter)
      • Certified Project Management Professional (CPM)
      • Certified Ethical Hacker (CEH)
      • Computer Hacking Forensic Investigator (CHFI)
      • Certified EC-Council Security Specialist (ECSS)
      • Certified EC-Council Security Analyst (ECSA)
      • Certified Network Security Administrator (NSA)

    Career Experience: Project Consultant at I TECH TRAIN SDN BHD

    Organization that I Had Worked With:

    • 1. His Majesty Sultan Flight (HMSF), Brunei

      2. USG BORAL, USA - Kuala Lumpur HQ

      3. Ministry of Defense, Malaysia (MINDEF)
    • 4. Telecom Brunei, TELBRU - Brunei

      5. Datastream Technology Sdn Bhd (DST), Brunei

      6. Johor Port Berhad, Malaysia

    Track B: Infrastructure

    Simply put, cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.

    Recommended Courses


    Don't miss out on updates.
    Subscribe to our newsletter!

    Thank you!