You are on page 1of 40

Updated January 2019

Rancangan
Talent Scouting Academy –
Cisco Netacad
Tim Netacad
14 Agustus 2021
Introduction
Cisco Networking Academy around the world

11,800
Academies

213K 482K
165K 180
Countries
171K
12.7M
207K 505K Students served
575K
28,400
Instructors

2.3M currently enrolled globally


© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Preparing people for IT careers since 1997 September 2020
Learning and innovation are core to We help drive education innovation.
who we are.

We are equipping the workforce of Security is critical to protecting your students.


the future. So, we build it into everything we make.

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Cisco Networking Academy Partnership

Cisco Partners Academies Employers


(ASC/ITC) (schools, univ, govt,
prisons, libraries,
NGOs, etc.)

Ecosystem Support Instructors Talent Bridge


Platform Training Students Career
Curriculum Facility Opportunities

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Supportive
Ecosystem

Free curriculum, Over 670 support Certification and Connect to Global


services, and platform and training partners equipment discounts jobs programs communities

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Global Delivery
Platform

Scalable, Cloud- Available in English, Custom Assessment Full-featured Provides access to all
based Spanish, French, Engine Learning curriculum and
Arabic, Portuguese, Management instructor resources
Simplified Chinese, System
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Russian
Skills-to-Jobs
Learning
Experience

Focus on skill Curriculum for Outcome-Based Hands-On Courses in up to


development, breadth & depth: Pedagogy Aligned to Activities and 25 Languages
assessment, and T-Shaped Industry Certification Simulation Tools
practice professionals
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Networking Academy Curriculum Portfolio October 2020

Explore Career
Introduction to exciting opportunities in Preparation for entry level positions.
technology.

IT Essentials PCAP: Programming Essentials in Python


Get Connected
Digital Essentials NDG Linux Essentials Hackathon Playbook (Design Thinking)
Introduction to Packet Tracer Networking Essentials

NDG Linux Unhatched Programmable


Networking Cybersecurity
Introduction to Cybersecurity Infrastructure
CCNA: Infrastructure Automation: CyberOps Associate
Cybersecurity Essentials Introduction to Networks (ITN)
DevNet Associate CCNA Security
Switching, Routing, & Wireless
Workshop: Network Programmability
Introduction to IoT Essentials (SRWE) IoT Security
Workshop: Experimenting with REST APIs
Enterprise Networking, Security &
Workshop: Model-Driven Programmability
Entrepreneurship Automation (ENSA)

CCNP Enterprise: Internet of Things:


Core Networking (ENCOR) IoT Fundamentals: Connecting Things
Advanced Routing (ENARSI) IoT Fundamentals: Big Data & Analytics

Practice Packet Tracer Gaming


Prototyping Virtual
Assessments
Physical
Increase mastery with hands-on tools Lab Labs Equipment
& experiences

Complementary Offerings NDG Linux I


NDG Linux II
CLA: Programming Essentials in C
CLP: Advanced Programming in C
Additional offerings available from Partners. NDG NetLab+ CPA: Programming Essentials in C++
NDG CyberOps Lab CPP: Advanced Programming in C++

Aligns to Certification Instructor Training Required Self-paced ASC Alignment Required © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Program Design
Introduction to Cybersecurity
23 – 27 August 2021. Timeline Program

Cybersecurity Network Security CyberOps


Essential 23 Aug – 10 Sept 2021 Associate
23 Aug – 3 Sept 2021 13 Sept – 15 Oct 2021

DevNet Associate Python


18 Oct – 5 Nov 2021 27 Sept – 15 Oct 2021

Certification
8 – 14 November 2021

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Courses Overview
Introduction
to Cybersecurity
Course Overview
The Introduction to Cybersecurity course explores cyber trends,
threats and staying safe in cyberspace, and protecting personal
and company data.

Benefits
Learn how to protect your personal data and privacy online and
in social media, and why more and more IT jobs require
cybersecurity awareness and understanding.

Learning Components
• 5 modules 20 hours
• Interactive and instructional content (10 hours sync, 10 hours async)
• 8 Activities and 7 lab exercises that reinforce learning
• 4 quizzes and 1 final exam
• Links to related resources

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Syllabus of Introduction to Cybersecurity
Delivery Number of
Module Learning Objective
Method Hours

Learn the need for and importance of cybersecurity.


The Need for Cybersecurity Self study 3
Understand the characteristics and value of personal data, and data within an organization.

Recognize the characteristics and operation of a cyber attack.


Attacks, Concepts and Techniques Self study 4
Interpret the trends in the cyber threat landscape.

Understand how to protect devices from threats.


Protecting Your Data and Privacy Self study 4
Master how to safeguard your privacy

Learn techniques to protect organizations from cyber attacks.

Protecting the Organization Recognize the behavior-based approach to cybersecurity. Self study 6

Explain Cisco’s approach to cybersecurity

Understand legal and ethical issues in cybersecurity


Will Your Future Be in Cybersecurity? Self study 3
Explore the opportunities for pursuing an education and a career in cybersecurity.

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Course Overview
Cybersecurity Essentials covers foundation knowledge and essentials
skills in all security domains in the cyber world - information security,
systems security, network security, mobile security, physical security,
ethics and laws, related technologies, defense and mitigation techniques
use in protecting

Prerequisites: Introduction to Cybersecurity


Languages: English
Course Delivery: Instructor-led or Self-paced
Estimated Time to Complete: 40 hours

Learning Components
• 8 chapters
• Interactive Multimedia Content
• 34 Activities, 10 Packet Tracer Activities, 12 Labs
that reinforce learning
• 8 end-of-chapters quiz, and 1 final exam
• Links to related resources
Syllabus of Cybersecurity Essentials (1)
Delivery Number of
Module Learning Objective
Method Hours
Describe the common characteristics comprising the cybersecurity world

Differentiate the characteristics of cyber criminals and professionals

Cybersecurity: A World of Wizardry, Criminals, and Heroes Compare how cybersecurity threats affect individuals, businesses, and organizations. self study 3

Describe the factors that lead to the spread and growth of cybercrime.

Describe the organizations and efforts committed to expanding the cybersecurity workforce.

Describe the three dimensions of the McCumber Cube.

Describe the principles of confidentiality, integrity, and availability.


The Cybersecurity Sorcery Cube Differentiate the three states of data. self study 5

Compare the types of cybersecurity countermeasures.

Describe the ISO Cybersecurity Model

Differentiate the types of malware and malicious code.

Cybersecurity Threats, Vulnerabilities and Attacks Compare the different methods used in social engineering. self study 5

Compare different types of cyberattacks.

Explain how encryption techniques protect confidentiality.


The Art of Protecting Secrets Describe how access control techniques protect confidentiality. self study 6

Describe the concept of obscuring data.

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Syllabus of Cybersecurity Essentials (2)
Explain processes used to ensure integrity.

Explain the purpose digital signatures.


The Art of Ensuring Integrity self study 6
Explain the purpose digital certificates.

Explain the need for database integrity enforcement.

Explain the concept of high availability.

Explain how high availability measures are used to improve availability.


The Realm of Five Nines self study 6
Describe how an incident response plan improves high availability.

Describe how disaster recovery planning plays an important role in implementing high availability.

Explain how processes and procedures protect systems.

Explain how to protect servers on a network.


Fortifying the Kingdom self study 5
Explain how to implement security measures to protect network devices.

Explain how physical security measures are implemented to protect network equipment.

Describe how cybersecurity domains are used within the CIA triad.

Joining the Order of Cyber Hero's Explain how ethics provide guidance. self study 4

Explain how to take the next step to become a cybersecurity professional

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Network Security Cybersecurity

Course Overview Course Details


This course introduces the core security concepts and
Target Audience: 2-year and 4-year college students
skills needed to configure and
in Networking or Engineering programs
troubleshoot computer networks and help ensure
the integrity of devices and data. Estimated Time to Completion: 100 hours

Recommended Preparation: Basic understanding of


Benefits computer networks (CCNA: Introduction to Networks
Gain practical, hands-on skills to design, implement, and CCNA: Switching, Routing, and Wireless
and manage network security systems and ensure Essentials, or equivalent)
their integrity.
Course Delivery: Instructor-led

Prepare for Careers Learning Component Highlights:


✓ 22 modules and 23 practice labs
✓ Build expertise in network security and data ✓ 22 Cisco Packet Tracer activities
protection ✓ 87+ interactive activities, videos, and quizzes
✓ Develop skills for entry-level network security ✓ 1 final exam
specialist roles
Course Recognitions: Certificate of Completion,
✓ Gain industry in-demand skills aligned with the Letter of Merit, Digital Badge Hands-on practice with
National Institute for Standards and Technology Cisco Packet Tracer
(NIST) Cybersecurity Framework Recommended Next Course:
CyberOps Associate, IoT Security

Quick Links Course Page Course Demos List of All Courses


© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public (Available for select courses) (Includes language availability)
Syllabus of Network Security (1)
Number of
Module Learning Objective Delivery Method
Hours
Module 1. Securing Networks
1.1 Current State of Affairs Describe the current network security landscape.
Self study 4
1.2 Network Topology Overview Describe how all types of networks need to be protected.
1.3 Securing Networks Summary A brief summary and the module quiz.
Module 2. Network Threats
2.1 Who is Attacking Our Network? Explain how network threats have evolved.
2.2 Threat Actor Tools Describe the various types of attack tools used by Threat Actors.
2.3 Malware Describe types of malware.
2.4 Common Network Attacks - Reconnaissance, Access, 4
Explain reconnaissance, access, and social engineering network attacks.
and Social Engineering
2.5 Network Attacks - Denial of Service, Buffer Overflows,
Explain Denial of Service, buffer overflow, and evasion attacks.
and Evasion
2.6 Network Threats Summary A brief summary and the module quiz.
Module 3. Mitigating Threats
3.1 Defending the Network Describe methods and resources to protect the network. Instructor-led &
3.2 Network Security Policies Explain several types of network security policies self study
3.3 Security Tools, Platforms, and Services Explain the purpose of security platforms. 5
3.4 Mitigating Common Network Attacks Describe the techniques used to mitigate common network attacks.
3.5 Cisco Network Foundation Protection Framework Explain how to secure the three functional areas of Cisco routers and switches.
3.6 Mitigating Threats Summary A brief summary and the module quiz.
Module 4. Secure Device Access
4.1 Secure the Edge Router Explain how to secure a network perimeter.
4.2 Configure Secure Administrative Access Use the correct commands to configure passwords on a Cisco IOS device.
5
4.3 Configure Enhanced Security for Virtual Logins Use the correct commands to configure enhanced security for virtual logins.
4.4 Configure SSH Configure an SSH daemon for secure remote management.
4.5 Secure Device Access Summary A brief summary and the module quiz.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Syllabus of Network Security (2)
Module 5. Assign Administrative Roles
Use the correct commands to configure administrative privilege levels to control command
5.1 Configure Privilege Levels
availability.
4
Use the correct commands to configure role-based CLI access to control command
5.2 Configure Role-Based CLI
availability.
5.3 Assign Administrative Roles Summary A brief summary and the module quiz.
Module 6. Device Monitoring and Management
Explain how the Cisco IOS resilient configuration feature and Secure Copy are used to
6.1 Secure Cisco IOS Image and Configuration Files
secure the Cisco IOS image and configuration files.
6.2 Lock Down a Router Using AutoSecure Use the correct commands for AutoSecure to enable security on IOS-based routers.
6.3 Routing Protocol Authentication Use the correct commands to configure routing protocol authentication.
5
6.4 Secure Management and Reporting Compare in-band and out-of-band management access.
6.5 Network Security Using Syslog Explain how to configure syslog to log system events. Instructor-led &
6.6 NTP Configuration Configure NTP to enable accurate timestamping between all devices. self study
6.7 SNMP Configuration Configure SNMP to monitor system status.
6.8 Device Monitoring and Management Summary A brief summary and the module quiz.
Module 7. Authentication, Authorization and Accounting
(AAA)
7.1 AAA Characteristics Describe AAA.
7.2 Configure Local AAA Authentication Configure AAA authentication to validate users against a local database.
7.3 Server-Based AAA Characteristics and Protocols Describe the server-based AAA protocols.
5
7.4 Configure Server-Based Authentication Configure server-based AAA authentication on Cisco routers.

7.5 Configure Server-Based Authorization and Accounting Use the correct commands to configure server-based AAA authorization and accounting.

7.6 Authentication, Authorization and Accounting (AAA)


A brief summary and the module quiz.
Summary
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Syllabus of Network Security (3)
Module 8. Access Control Lists
8.1 Introduction to Access Control Lists Describe standard and extended IPv4 ACLs.
8.2 Wildcard Masking Explain how ACLs use wildcard masks
8.3 Configure ACLs Explain how to configure ACLs.
8.4 Modify ACLs Use sequence numbers to edit existing standard IPv4 ACLs 6
8.5 Implement ACLs Implement ACLs.
8.6 Mitigate Attacks with ACLs Use ACLs to mitigate common network attacks.
8.7 IPv6 ACLs Configure IPv6 ACLs using CLI.
8.8 Access Control Lists Summary A brief summary and the module quiz.
Module 9: Firewall Technologies
9.1 Secure Networks with Firewalls Explain how firewalls are used to help secure networks.
3
9.2 Firewalls in Network Design Explain design considerations for implementing firewall technologies Instructor-led &
9.3 Firewall Technologies Summary A brief summary and the module quiz. self study
Module 10: Zone-Based Policy Firewalls
10.1 ZPF Overview Explain how Zone-Based Policy Firewalls are used to help secure a network.
10.2 ZPF Operation Explain the operation of a Zone-Based Policy Firewall. 4
10.3 Configure a ZPF Configure a Zone-Based Policy Firewall with CLI.
10.4 Zone-Based Policy Firewalls Summary A brief summary and the module quiz.
Module 11: IPS Technologies
11.1 IDS and IPS Characteristics Explain the functions and operations of IDS and IPS systems.
11.2 IPS Implementations Explain how network-based IPS are implemented.
6
11.3 IPS on Cisco ISRs Describe the IPS technologies that are available on Cisco ISR routers.
11.4 Cisco Switched Port Analyzer Configure Cisco SPAN.
11.5 IPS Technologies Summary A brief summary and the module quiz.

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Syllabus of Network Security (4)
Module 12: IPS Operation and Implementation
12.1 IPS Signatures Describe IPS signatures.
12.2 Cisco Snort IPS Explain how the Cisco Snort IPS provides network security services. 6
12.3 Configure Snort IPS Explain how to configure Snort IPS on a Cisco ISR G2.
12.4 IPS Operation and Implementation Summary A brief summary and the module quiz.
Module 13: Endpoint Security
13.1 Endpoint Security Overview Describe endpoint security and the enabling technologies.
5
13.2 802.1X Authentication Explain the functions of 802.1x components.
13.3 Endpoint Security Summary A brief summary and the module quiz.
Module 14: Layer 2 Security Considerations
14.1 Layer 2 Security Threats Describe Layer 2 vulnerabilities.
14.2 MAC Table Attacks Describe MAC address spoofing attacks.
14.3 Mitigate MAC Table Attacks Configure port security.
Instructor-led &
14.4 Mitigate VLAN Attacks Explain how to mitigate VLAN attacks.
self study
14.5 Mitigate DHCP Attacks Use the correct command to implement DHCP Snooping for attack mitigation. 6
14.6 Mitigate ARP Attacks Use the correct command to mitigate ARP attacks.
14.7 Mitigate Address Spoofing Attacks Use the correct command to mitigate address spoofing attacks.
14.8 Spanning Tree Protocol Explain the operation of Spanning Tree Protocol.
14.9 Mitigate STP Attacks Configure security measures to mitigate STP attacks.
14.10 Layer 2 Security Considerations Summary A brief summary and the module quiz.
Module 15 Cryptographic Services
Explain the requirements of secure communications including integrity, authentication, and
15.1 Secure Communications
confidentiality.
15.2 Cryptography Describe cryptography. 4
15.3 Cryptanalysis Describe cryptanalysis.
15.4 Cryptology Describe cryptology.
15.5 Cryptographic Services Summary A brief summary and the module quiz.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Syllabus of Network Security (5)
Module 16: Basic Integrity and Authenticity
16.1 Integrity and Authenticity Explain the role of cryptography in ensuring the integrity and authenticity of data.
16.2 Key Management Describe the components of key management. 5
16.3 Confidentiality Explain how cryptographic approaches enhance data confidentiality.
16.4 Basic Integrity and Authenticity Summary A brief summary and the module quiz.
Module 17: Public Key Cryptography
17.1 Public Key Cryptography with Digital Signatures Explain public key cryptography.
17.2 Authorities and the PKI Trust System Explain how the public key infrastructure functions. 4
17.3 Applications and Impacts of Cryptography Explain how the use of cryptography affects cybersecurity operations.
17.4 Public Key Cryptography Summary A brief summary and the module quiz.
Module 18: VPNs
18.0 Introduction An introduction to the module.
18.1 VPN Overview Describe VPNs and their benefits.
18.2 VPN Topologies Compare remote-access and site-to-site VPNs.
Instructor-led & 4
18.3 IPsec Overview Describe the IPsec protocol and its basic functions.
self study
18.4 IPsec Protocols Compare AH and ESP protocols.
18.5 Internet Key Exchange Describe the IKE protocol.
18.6 VPNs Summary A brief summary and the module quiz.
Module 19: Implement Site-to-Site IPsec VPNs with CLI
19.1 Configure a Site-to-Site IPsec VPN Describe IPsec negotiation and the five steps of IPsec configuration.
19.2 ISAKMP Policy Use the correct commands to configure an ISAKMP policy.
19.3 IPsec Policy Use the correct commands to configure the IPsec policy. 4
19.4 Crypto Map Use the correct command to configure and apply a Cryptomap.
19.5 IPsec VPN Configure the IPsec VPN.
19.6 Implement Site-to-Site IPsec VPNs with CLI Summary A brief summary and the module quiz.
Module 20: Introduction to the ASA
20.1 ASA Solutions Compare ASA solutions to other routing firewall technologies.
3
20.2 The ASA 5506-X with FirePOWER Services Describe three ASA deployment scenarios.
20.3 Introduction to the ASA Summary A brief summary and the module quiz.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Syllabus of Network Security (6)
Module 21: ASA Firewall Configuration Implement an ASA firewall configuration.
21.0 Introduction
21.1 Basic ASA Firewall Configuration Explain how to configure an ASA-5506-X with FirePOWER Services.
21.2 Configure Management Settings and Services Configure management settings and services on a ASA5506-X firewall.
21.3 Object Groups Explain how to configure object groups on an ASA.
4
21.4 ASA ACLs Use the correct commands to configure access lists with object groups on an ASA.
21.5 NAT Services on an ASA Use the correct commands to configure an ASA to provide NAT services. Instructor-led &
21.6 AAA Use correct command to configure access control using the local database and AAA server. self study
21.7 Service Policies on an ASA Configure service policies on an ASA
21.8 ASA Firewall Configuration Summary A brief summary and the module quiz.
Module 22: Network Security Testing
22.1 Network Security Testing Techniques Describe the techniques used in network security testing.
4
22.2 Network Security Testing Tools Describe the tools used in network security testing
22.3 Network Security Testing Summary A brief summary and a module quiz.

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
CyberOps Associate Cybersecurity

Course Details
Course Overview
This course introduces the core security
Target Audience: Students enrolled in technology
concepts and skills needed to monitor, detect,
degree programs at higher education institutions;
analyze, and respond to cybercrime, IT professionals who wants to pursue a career in
cyberespionage, insider threats, advanced Security Operations
persistent threats, regulatory requirements, and
other cybersecurity issues facing organizations.
Estimated Time to Completion: 160 hours

Benefits Recommended Preparation: Introduction to


Gain practical, hands-on skills needed to Cybersecurity, Cybersecurity Essentials
maintain and ensure security operational
readiness of secure networked systems. Course Delivery: Instructor-led

Learning Component Highlights:


Prepare for Careers ✓ 28 Modules and 46+ hands-on labs
✓ Develop skills for entry-level security ✓ 113 interactive activities, videos, & quizzes
operations center (SOC) jobs ✓ 6 Cisco Packet Tracer activities
✓ 1 practice certification exam
✓ Prepare for CyberOps Associate certification
Certification Aligned
✓ Pursue a career in cybersecurity operations, Cisco Certified CyberOps Associate
Course Recognitions: Certificate of Completion,
a rapidly-growing, exciting new area that Letter of Merit, Digital Badge
spans all industries
Recommended Next Course:
CCNA Security, IoT Security

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Syllabus of CyberOps Associate (1)
Delivery Number of
Module Learning Objective
Method Hours
Module 1. The Danger
1.1 War Stories Outline features of cybersecurity incidents.
1.2 Threat Actors Explain the motivations of the threat actors behind specific security incidents. 4
1.3 Threat Impact Explain the potential impact of network security attacks.
1.4 The Danger Summary A brief summary and the module quiz. Self Study
Module 2. Fighters in the War Against Cybercrime
2.1 The Modern Security Operations Center Explain the mission of the security operations center.
3
2.2 Becoming a Defender Describe resources available to prepare for a career in cybersecurity operations.
2.3 Fighters in the War Against Cybercrime Summary A brief summary and the module quiz.
Module 3. The Windows Operating System
3.1 Windows History Describe the history of the Windows Operating System.
3.2 Windows Architecture and Operations Explain the architecture of Windows and its operation.
7
3.3 Windows Configuration and Monitoring Explain how to configure and monitor Windows.
3.4 Windows Security Explain how Windows can be kept secure.
3.5 The Windows Operating System Summary A brief summary and the module quiz.
Module 4. Linux Overview
Instructor-led &
4.1 Linux Basics Explain why Linux skills are essential for network security monitoring and investigation.
self study
4.2 Working in the Linux Shell Use the Linux shell to manipulate text files.
4.3 Linux Servers and Clients Explain how client-server networks function.
4.4 Basic Server Administration Explain how a Linux administrator locates and manipulates security log files. 7
4.5 The Linux File System Manage the Linux file system and permissions.
4.6 Working with the Linux GUI Explain the basic components of the Linux GUI.
4.7 Working on a Linux Host Use tools to detect malware on a Linux host.
4.8 Linux Basics Summary A brief summary and the module quiz.

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Syllabus of CyberOps Associate (2)
Module 5. Network Protocols
5.1 Network Communication Process Explain the basic operations of data networked communications.
5.2 Communication Protocols Explain how protocols enable network operations. 5
5.3 Data Encapsulation Explain how data encapsulation allows data to be transported across the network.
5.4 Network Protocols Summary A brief summary and the module quiz.
Module 6. Ethernet and Internet Protocol (IP) Explain how the ethernet and IP protocols support network communications.
6.0 Introduction
6.1 Ethernet Explain how Ethernet supports network communication.
6.2 IPv4 Explain how the IPv4 protocol supports network communications.
6.3 IP Addressing Basics Explain how IP addresses enable network communication. 6
6.4 Types of IPv4 Addresses Explain the types of IPv4 addresses that enable network communication.
Instructor-led &
6.5 The Default Gateway Explain how the default gateway enables network communication.
self study
6.6 IPv6 Prefix Length Explain how the IPv6 protocol supports network communications.
6.7 Ethernet and IP Protocol Summary A brief summary and the module quiz.
Module 7. Principles of Network Security
7.1 ICMP Explain how ICMP is used to test network connectivity.
4
7.2 Ping and Traceroute Utilities Use Windows tools, ping, and traceroute to verify network connectivity.
7.3 Connectivity Verification Summary A brief summary and the module quiz.
Module 8. Address Resolution Protocol
8.1 MAC and IP Compare the roles of the MAC address and the IP address.
8.2 ARP Analyze ARP by examining Ethernet frames. 5
8.3 ARP Issues Explain how ARP requests impact network and host performance.
8.4 Address Resolution Protocol Summary A brief summary and the module quiz.

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Syllabus of CyberOps Associate (3)
Module 9. The Transport Layer
9.1 Transport Layer Characteristics Explain how transport layer protocols support network communication.
9.2 Transport Layer Session Establishment Explain how the transport layer establishes communication sessions. 5
9.3 Transport Layer Reliability Explain how the transport layer establishes reliable communications.
9.4 The Transport Layer Summary A brief summary and the module quiz.
Module 10. Network Services
10.1 DHCP Explain how DHCP services enable network functionality.
10.2 DNS Explain how DNS services enable network functionality.
10.3 NAT Explain how NAT services enable network functionality.
6
10.4 File Transfer and Sharing Services Explain how file transfer services enable network functionality.
10.5 Email Explain how email services enable network functionality.
10.6 HTTP Explain how HTTP services enable network functionality.
10.7 Network Services Summary A brief summary and the module quiz. Instructor-led &
Module 11. Network Communication Devices self study
11.1 Network Devices Explain how network devices enable network communication.
4
11.2 Wireless Communications Explain how wireless devices enable network communication.
11.3 Network Communication Devices Summary A brief summary and the module quiz.
Module 12. Network Security Infrastructure
12.1 Network Topologies Explain how network designs influence the flow of traffic through the network.
12.2 Security Devices Explain how specialized devices are used to enhance network security. 5
12.3 Security Services Explain how network services enhance network security.
12.4 Network Security Infrastructure Summary A brief summary of this module.
Module 13. Attackers and Their Tools
13.1 Who is Attacking Our Network? Explain how network threats have evolved.
5
13.2 Threat Actor Tools Describe the various types of attack tools used by Threat Actors.
13.3 Attackers and Their Tools Summary A brief summary and the module quiz.

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Syllabus of CyberOps Associate (4)
Module 14. Common Threats and Attacks
14.1 Malware Describe types of malware.
14.2 Common Network Attacks – Reconnaissance, Access, and Social
Explain reconnaissance, access, and social engineering attacks.
Engineering 5
14.3 Network Attacks – Denial of Service, Buffer Overflows, and
Explain denial of service, buffer overflow, and evasion attacks.
Evasion
14.4 Common Threats and Attacks Summary A brief summary and the module quiz.
Module 15. Observing Network Operation
15.1 Introduction to Network Monitoring Explain the importance of network monitoring
4
15.2 Introduction to Network Monitoring Tools Explain how network monitoring is conducted.
15.3 Network Monitoring and Tools Summary A brief summary and the module quiz.
Module 16. Attacking the Foundation
16.1 IP PDU Details Explain the IPv4 and IPv6 header structure.
16.2 IP Vulnerabilities Explain how IP vulnerabilities enable network attacks. Instructor-led & 5
16.3 TCP and UDP Vulnerabilities Explain how TCP and UDP vulnerabilities enable network attacks. self study
16.4 Attacking the Foundation Summary A brief summary and the module quiz.
Module 17. Attacking What We Do
17.1 IP Services Explain IP service vulnerabilities.
6
17.2 Enterprise Services Explain how network application vulnerabilities enable network attacks.
17.3 Attacking What We Do Summary A brief summary and the module quiz.
Module 18. Understanding Defense
18.1 Defense-in-Depth Explain how the defense-in-depth strategy is used to protect networks.
6
18.2 Security Policies, Regulations, and Standards Explain security policies, regulations, and standards.
18.3 Understanding Defense Summary A brief summary and the module quiz.
Module 19. Access Control
19.1 Access Control Concepts Explain how access control protects network data.
6
19.2 AAA usage and operation Explain how AAA is used to control network access.
19.3 Access Control Summary A brief summary and the module quiz.

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Syllabus of CyberOps Associate (5)
Module 20. Threat Intelligence
Describe information sources used to communicate emerging network security
20.1 Information Sources
threats. 6
20.2 Threat Intelligence Services Describe various threat intelligence services.
20.3 Threat Intelligence Summary A brief summary and the module quiz.
Module 21. Cryptography
21.1 Integrity and Authenticity Explain the role of cryptography in ensuring the integrity and authenticity data.
21.2 Confidentiality Explain how cryptographic approaches enhance data confidentiality.
21.3 Public Key Cryptography Explain public key cryptography. 7
21.4 Authorities and the PKI Trust System Explain how the public key infrastructure functions.
21.5 Applications and Impacts of Cryptography Explain how the use of cryptography affects cybersecurity operations.
21.6 Cryptography Summary A brief summary of this module.
Module 22. Endpoint Protection
22.1 Antimalware Protection Explain methods of mitigating malware.
22.2 Host-based Intrusion Prevention Explain host-based IPS/IDS log entries. Instructor-led & 6
22.3 Application Security Explain how sandbox is used to analyze malware. self study
22.4 Endpoint Protection Summary A brief summary and the module quiz.
Module 23. Endpoint Vulnerability Assessment
23.1 Network and Server Profiling Explain the value of network and server profiling.
23.2 Common Vulnerability Scoring System (CVSS) Explain how CVSS reports are used to describe security vulnerabilities.
Explain how secure device management techniques are used to protect data and 7
23.3 Secure Device Management
assets.
23.4 Information Security Management Systems Explain how information security management systems are used to protect assets.
23.5 Endpoint Vulnerability Assessment Summary A brief summary and the module quiz.
Module 24. Technologies and Protocols
Explain the behavior of common network protocols in the context of security
24.1 Monitoring Common Protocols
monitoring.
4
Explain how security technologies affect the ability to monitor common network
24.2 Security Technologies
protocols.
24.3 Technologies and Protocols Summary A brief summary and the module quiz. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Syllabus of CyberOps Associate (6)
Module 25. Network Security Data
25.1 Types of Security Data Describe the types of data used in security monitoring.
25.2 End Device Logs Describe the elements of an end device log file. 6
25.3 Network Logs Describe the elements of a network device log file.
25.4 Network Security Data Summary A brief summary and the module quiz.
Module 26. Evaluating Alerts Explain the process of evaluating alerts.
26.1 Source of Alerts Identify the structure of alerts.
5
26.2 Overview of Alert Evaluation Explain how alerts are classified.
26.3 Evaluating Alerts Summary A brief summary and the module quiz.
Module 27. Working with Network Security Data Interpret data to determine the source of an alert.
27.0 Introduction
Explain how data is prepared for use in Network Security Monitoring (NSM)
27.1 A Common Data Platform Instructor-led &
system. 6
self study
27.2 Investigating Network Data Use Security Onion tools to investigate network security events.
27.3 Enhancing the Work of the Cybersecurity Analyst Describe network monitoring tools that enhance workflow management.
27.4 Working with Network Security Data Summary A brief summary and the module quiz.
Module 28. Digital Forensics and Incident Analysis and Response
28.1 Evidence Handling and Attack Attribution Explain the role of digital forensic processes.
28.2 The Cyber Kill Chain Identify the steps in the Cyber Kill Chain.
28.3 The Diamond Model of Intrusion Analysis Classify an intrusion event using the Diamond Model.
7
Apply the NIST 800-61r2 incident handling procedures to a given incident
28.4 Incident Response
scenario.
28.5 Digital Forensics and Incident Analysis and Response Summary A brief summary of this module.
28.6 Prepare for Your Exam and Launch Your Career! Certification preparation, discount vouchers, and other career resources.
Bootcamp Certification 8

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
PCAP: PROGRAMMING ESSENTIALS IN PYTHON

✓ For beginners with little or no prior knowledge of programming;


✓ Broken down into two parts: PE1 (Basics) and PE2 (Intermediate), each part designed to be an independent;
✓ 8 x modules, 8 x quizzes, 8 x tests, 30+ lab scenarios, 2 x summary tests, and the final test;
✓ Accessed online with no special equipment or system requirements;
✓ Aligned with PCEP – Certified Entry-Level Python Programmer (PE1)
and PCAP – Certified Associate in Python Programming (PE2) certifications.

Estimated Time to Completion : 100 hours

© 2017-2021 OPENEDG PYTHON INSTITUTE | ALL RIGHTS RESERVED | WWW.PYTHONINSTITUTE.ORG 32


Syllabus of Programming Essentials in
Python (1) Delivery Number
Module Learning Objective
Method of Hours
have a basic knowledge of computer programming and software development;
Understand the fundamental programming concepts, such as: compiler, interpreter, source code,
machine code, IDE;
Introduction to Python Self Study 8
have an orientation in Python's development history, its main traits and features;
gain skills allowing her/him to install and configure basic development tools as well as code, and run the
very first Python program .
gain skills enabling her/him to create, edit and run Python source files using IDLE; h ave some
knowledge of Pyt hon's numeral literals, their syntax, types and formats;
Data types, variables, basic input-output
have an orientation in issues related to Python arithmetic operators and expressions; 8
operations, basic operators
have skills that enable her/him to perform basic input/output operations in a Python program .
gain the ability to name, create, initialize and modify variables;
Know basic features of the Boolean data type;
gainskills to work with relational operators in Python;
h avethe ability to effectively use the control statements if, if-else andif-elif- else;
Boolean values, conditional execution, loops, understand the role of a loop and be able to use the control statements while and for;
lists and list processing, logical and bitwise have an orientation in bitwise operations in Python; Instructor-led & 12
operations know the role of lists and be able to operate with them to perform actions including indexing, slicing and self study
content manipulation;
understand how the bubble-sort algorithm works;
have a knowledge of multidimensional lists in Python.
understand the concept of functions and be able to code and invoke her/his own functions;
have an orientation of the main features of structural programming;
Functions, tuples, dictionaries, and data have some knowledge of name scopes and be able to distinguish global and local variables, as well as
14
processing understand how name shadowing works;
understand the principles of tuples including the immutability notion;
know the role of dictionaries and be able to use them effectively in appropriate circumstances;
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Syllabus of Programming Essentials in
Python (2)
understand the role of the Python module and know the available ways of importing modules into
her/his own code/namespace;
gain knowledge of selected useful standard Python modules;
Modules, Packages and PIP 12
have an orientation in package purposes as well as be able to create her/his own packages;
know the main function of PIP and be able to use it in order to install and uninstall ready-to-use
packages from PyPl.
know how characters are coded and stored inside the computer's memory, distinguish most known
coding standards;
gain knowledge of Python's sequences and know the differences between strings and lists;
Strings, String and List Methods, Exceptions be able to effectively use selected Iists and string methods; 10
have an orientation of Python's way of identifying and handling runtime errors; Understand the
purpose of the control statements try, except and raise;
understand Python exception hierarchies.
Instructor-led &
understand the fundamental concepts of object programming like class, object, property, method,
self study
inheritance and polymorphism;
have an orientation in the differences between procedural and object approaches, as well as being
Object-Oriented Programming oriented when both of the techniques reveal their pros and cons; 15
be able to build her/his own classes, objects, properties and methods;
be able to use inheritance and polymorphism in her/his inheritance path;
understand the objective nature of Python exceptions.
gain the ability to understand the concepts of generators, iterators and closures as well as be able to
use them in adequate applications;
know how Python accesses physical file-system resources, understand file open modes and perform
Miscellaneous 8
basic input/output operations in relation to text and binary files;
gain an ability to manipulate date and time, work with a calendar, and create directory structures using
Python;
Bootcamp Certification 13

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
DevNet Associate 1.0 Infrastructure Automation

Course Overview Course Details


This course introduces the methodologies and tools
of modern software development, applied to the IT Target Audience: Secondary vocational
students, 2-year and 4-year college students
and Network operations. It covers a 360 view of the
and participants of coding bootcamps
domain including microservices, testing, containers
and DevOps, as well as securely automating Estimated Time to Completion: 160 hours
infrastructures with Application Programming
Interfaces (APIs). Recommended Preparation:
Coding skills, equivalent to:
PCAP: Programming Essentials in Python
Benefits Fundamental skills of networking, equivalent to:
Gain practical, relevant, hands-on lab experience, CCNA: Introduction to Networks
including programming in Python, using GIT and
common data formats (JSON, XML and YAML), Course Delivery: Instructor-led
deploying applications as containers, using
Learning Component Highlights:
Continuous Integration/Continuous Deployment ✓ 8 Modules with 6 Videos, 23 Hands-on
(CI/CD) pipelines and automating infrastructure using Labs and 5 Cisco Packet Tracer Activities
code. ✓ 8 Quizzes, 8 Module Exam, Practice Final
Exam, Final Exam, Skills Based Assessment
Certification Aligned
Prepare for Careers ✓ Practice Exam for DEVASC Certification
Cisco Certified DevNet Associate
✓ Develop skills for entry-level software Course Recognitions: Certificate of Completion,
development and infrastructure automation jobs Letter of Merit, Digital Badge, Cert Voucher
✓ Prepare for DevNet Associate certification exam Recommended Next Course:
CCNA, CCNP or CyberOps Associate
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Syllabus of DevNet Associate (1)
Number of
Module Learning Objective Delivery Method
Hours
Module 1. Course Introduction
1.1 Your Lab Environment Install a virtual lab environment.
10
1.2 Linux Manage the Linux file system and permissions.
1.3 Python Use basic Python programming.
Module 2. The DevNet Developer Environment
2.1 DevNet Overview Explain how DevNet encourages communities of network programmers. 10
2.2 Exploring DevNet Online Resources Investigate DevNet online resources.
Module 3. Software Development and Design
3.1 Software Development Compare software development methodologies.
3.2 Software Design Patterns Describe the benefits of various software design patterns.
3.3 Version Control Implement software version control using GIT. 18
Instructor-led &
3.4 Coding Basics Explain coding best practices.
self study
3.5 Code Review and Testing Use Python Unit Test to evaluate code.
3.6 Understanding Data Formats Use Python to parse different messaging and data formats.
Module 4. Understanding and Using APIs
4.1 Introducing APIs Explain the use of APIs.
4.2 API Design Styles Compare synchronous and asynchronous API design styles.
4.3 API Architecture Styles Describe common API architecture styles.
4.4 Introduction to REST APIs Explain the functions of REST APIs. 20
4.5 Authenticating to a REST API Create REST API requests over HTTPS to securely integrate services.
4.6 API Rate Limits Explain the purpose of API rate limits.
4.7 Working with Webhooks Explain the use of webhooks.
4.8 Troubleshooting API Calls Explain how to troubleshoot REST APIs.

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Syllabus of DevNet Associate (2)
Module 5. Network Fundamentals
5.1 Introduction to Network Fundamentals Explain basic network terms and processes.
5.2 Network Interface Layer Explain the features and functions of the OSI network layer.
5.3 Internetwork Layer Explain the features and functions of the OSI internetwork layer. 20
5.4 Network Devices Explain the features and functions of common network devices.
5.5 Networking Protocols Explain common networking protocols.
5.6 Troubleshooting Application Connectivity Issues Troubleshoot basic network connectivity.
Module 6. Application Deployment and Security
6.1 Understanding Deployment Choices with Different
Explain common cloud deployment models.
Models
6.2 Creating and Deploying a Sample Application Use container technology to deploy a simple application.
6.3 Continuous Integration/Continuous Deployment Explain the use of Continuous Integration/Continuous Deployment (CI/CD) in application Instructor-led & 22
(CI/CD) deployment. self study
Explain the network technology required for application development in a cloud
6.4 Networks for Application Development and Security
environment.
6.5 Securing Applications Use common application security techniques to secure data.
Module 7. Infrastructure and Automation
7.1 Automating Infrastructure with Cisco Describe deployment environments that benefit from automation.
7.2 DevOps and SRE Explain the principles of DevOps.
7.3 Basic Automation Scripting Describe the use of scripting in automation.
22
7.4 Automation Tools Explain automation tools that speed the development and deployment of code.
7.5 Infrastructure as Code Explain the benefits of storing infrastructure as code.
7.6 Automating Testing Explain how automation tools are used in the testing of application deployments.
7.7 Network Simulation Describe the use of the Cisco VIRL network simulation test environment.

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Syllabus of DevNet Associate (3)
Module 8. Cisco Platforms and Development
8.1 Introduction to Cisco Platforms Describe the Cisco API platform.
8.2 Cisco SDKs Explain how Cisco SDKs assist in the development of applications.
8.3 Understanding Network Programmability and
Compare network programmability models.
Device Models Instructor-led & 18
8.4 Cisco Network Management Compare Cisco network management platforms. self study
8.5 Cisco Compute Management Describe Cisco compute management solutions.
8.6 Cisco Collaboration Platforms Describe Cisco collaboration platforms.
8.7 Cisco Security Platforms Describe Cisco security platforms.
Bootcamp Certification 20

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Industry Certification

CBROPS 200-201 DEVAS 200-901 PCAP-31-03

You might also like