CyberOps Associate: Module 5 – Network Protocols

5.0 Introduction 5.0.1 Why Should I Take this Module? We all communicate on networks daily. Looking at social media, streaming video, or researching information on the internet are common activities that we normally don’t think much about. However, numerous technological processes are at work to bring us the …

CyberOps Associate: Module 4 – Linux Overview

4.0 Introduction 4.0.1 Why Should I Take this Module? Linux is an open-source operating system that is fast, powerful, and highly customizable. It is built for network use as either a client or server. Linux is well-loved by a large community of users, including cybersecurity personnel. Study this …

CyberOps Associate: Module 1 – The Danger

1.0 Introduction 1.0.1 First Time in This Course CyberOps Associate v1.0 covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC). Upon completion of the CyberOps Associate v1.0 course, students will be able …

28.4.12 Lab – Incident Handling (Answers)

28.4.12 Lab – Incident Handling (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Apply your knowledge of security incident handling procedures to formulate questions about given incident scenarios. Background / Scenario Computer security incident response has …