CSOa:CCNACybersecurityOperations
Class Schedule – summer semester 2023/2024
Module | Group 1, 2 |
---|---|
M1, M2 3pts | 5. 2. |
M3, M4 3pts | 12. 2. |
M5-8 2pts | 19. 2. |
M9-12, M24 2pts | 26. 2. |
M13-17 2pts | 4. 3. |
Gen (Jakub Kroustek) 4pts | 11. 3. |
M18-20 2pts | 18. 3. |
M21-23 2pts | 25. 3. |
M25-27 2pts | 8. 4. |
M28 2pts | 15. 4. |
Patron-IT (Martina Haller) 3pts | 22. 4. |
NUKIB 3pts | 29. 4. |
Skills + Final | 6. 5. |
Challenge Lab
All submissions must be done via Central Information System as well as email by deadline. Later submission will not be accepted
Challenge Lab #1 (Vladimir Vesely, Viliam Letavay)
- assignment 25th March 2024
- deadline 15th April 2024
Important course links
- Official course annotation https://www.fit.vut.cz/study/course/268176/.en
Lecturers
Labs
- Laboratory room Cisco, C304
- Terms:
- Group 1 – every Monday from 8:00 to 12:00
- Group 2 – every Monday from 13:00 to 17:00
Assessments
- active participation in laboratory exercises (max. 30 points)
- one/two challenge lab(s) (max. 30 points)
- final configuration practice test and test on theoretical skills (max. 40 as 30+10 points)
In order to pass this course, you need to:
- participate in 80%+ of laboratory exercises, i.e., be present at least in 9 of 13 laboratory exercises
- get at least half of the points from each classification activity, i.e., laboratory exercises, challenge labs, theoretical, final practice)
In order to obtain official Cisco Certificate of Course Completation, you need to achieve at least 80% from all assessments.
There is no way how to substitute missing class.
Official slides
- Module 1: The Danger
- Module 2: Fighters in the War Against Cybercrime
- Module 3: The Windows Operating System
- Module 4: Linux Overview
- Module 5: Network Protocols
- Module 6: Ethernet and Internet Protocol
- Module 7: Connectivity Verification
- Module 8: Address Resolution Protocol
- Module 9: The Transport Layer
- Module 10: Network Services
- Module 11: Network Communication Devices
- Module 12: Network Security Infrastructure
- Module 13: Attackers and Their Tools
- Module 14: Common Threats and Attacks
- Module 15: Network Monitoring and Tools
- Module 16: Attacking the Foundation
- Module 17:Attacking What We Do
- Module 18: Understanding Defense
- Module 19: Access Control
- Module 20: Threat Intelligence
- Module 21: Cryptography
- Module 22: Endpoint Protection
- Module 23: Endpoint Vulnerability Assessment
- Module 24: Technologies and Protocols
- Module 25: Network Security Data
- Module 26: Evaluating Alerts
- Module 27: Working with Network Security Data
- Module 28: Digital Forensics and Incident Analysis and Response
Lab Materials
Our slidedecks