Professional Documents
Culture Documents
Learning Services: Securing Cisco Networks With Threat Detection and Analysis (SCYBER)
Learning Services: Securing Cisco Networks With Threat Detection and Analysis (SCYBER)
Learning Services
The Securing Cisco® Networks with Threat Detection Analysis (SCYBER) course,
version 1.0 is an instructor-led course offered by Learning Services High-Touch Delivery.
This lab-intensive training course prepares you to take the Cyber Security Specialist
Certification exam (exam ID = 600-199) and to hit the ground running as a security
analyst team member.
The course combines lecture materials and hands-on labs throughout to make sure that
you are able to successfully understand cyber security concepts and to recognize specific
threats and attacks on your network. This course is designed to teach you how a network
security operations center (SOC) works and how to begin to monitor, analyze, and
respond to security threats within the network. The job role for a security analyst will vary
from industry to industry and differ in the private sector versus the public sector.
Duration
Five days.
Target Audience
This course is designed for technical professionals who need to know how to monitor, analyze, and
respond to network security threats and attacks.
Course Objectives
Upon completion of this course, you should have obtained four major areas of competency:
All contents are Copyright © 2013 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 4
Education Data Sheet
Learning Services
Course Prerequisites
Following is the recommended prerequisite training for this course:
● Standard CCNA® certification as a minimum with CCNA Security a plus
● Basic Cisco IOS® Software switch and router configuration skills
Course Outline
The course outline is as follows:
Lab Outline
The lab outline is as follows:
All contents are Copyright © 2013 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 4
Education Data Sheet
Learning Services
The course uses software such as Lancope, Splunk, OSSIM, and Observium to simulate
some of the most current cyber security threats on the lab equipment. For example, in the
module “Investigating Security Threats,” you will perform the initial configuration of
NetFlow, followed by interpreting the traffic in the NetFlow environment. Similarly, you will
configure SNMP monitoring to work with the Observium software.
Figure 1 shows the high-level lab topology for this course.
ASA TIS
Controlled Outside
64.102.246.131 Zone 0
10.2.X.X
Packet Capture
Network
Flow Capture
Zone 2
Pod1 Pod P
10.2.2.1P-2P
10.2.2.11
Student
1941 1941 Pods 2-12
10.3.1.1 10.3.P.1
10.3.1.X 10.3.P.X
Network Network
Zone 3 Zone 3
10.3.1.10 10.3.P.10
Student Vmware Student Vmware
Servers & XP Servers & XP
Client Client
All contents are Copyright © 2013 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 4
Education Data Sheet
Learning Services
Registration Email
For more information about schedules and registration for this course, contact
aeskt_registration@external.cisco.com.
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go
to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (1110R)
All contents are Copyright © 2013 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 4