CSOa:CCNACybersecurityOperations
Class Schedule – summer semester 2022/2023
Module | Group 1, 2 |
---|---|
M1, M2 | 7. 2., 9. 2. |
M3, M4 | 14. 2., 16. 2. |
M5-8 | 21. 2., 23. 2. |
M9-12, M24 | 28. 2., 2. 3. |
M13-17 | 7. 3., 9. 3. |
M18-20 | 14. 3., 16. 3. |
Gen | 21. 3., 23. 3. |
M21-23 | 28. 3., 30. 3. |
M25-27 | 4. 4., 6. 4. |
M28 | 11. 4., 13. 4. |
EOSecurity | 18. 4., 20. 4. |
NUKIB | 25. 4.. 27. 4. |
Skills + Final | 2. 5., 4. 5. |
Challenge Labs
All submissions must be done via Central Information System as well as email by deadline. Later submission will not be accepted
Challenge Lab #1 (Vladimir Vesely, Viliam Letavay)
- assignment 14th March 2023
- deadline 7th April 2023
Challenge Lab #2 (Vladimir Vesely, Peter Hornak, Andrej Zaujec)
- assignment 4th April 2023
- deadline 28th April 2023
Important course links
- Official course annotation https://www.fit.vut.cz/study/course/259544/
Lecturers
Labs
- Laboratory room Cisco, C304
- Terms:
- Group 1 – every Tuesday from 11:00 to 15:00
- Group 2 – every Thursday from 11:00 to 15:00
Assessments
- active participation in labs (max. 26 points)
- two challenge labs (max. 20 points)
- final configuration practice test and test on theoretical skills (max. 54 points)
In order to pass this course, you need to:
- participate in 80%+ laboratory exercises
- get at least half of the points from each activity
In order to obtain official Cisco Certificate of Course Completation, you need to achieve at least 80% from all assessments.
There is no way how to substitute missing class.
Official slides
- Module 1: The Danger
- Module 2: Fighters in the War Against Cybercrime
- Module 3: The Windows Operating System
- Module 4: Linux Overview
- Module 5: Network Protocols
- Module 6: Ethernet and Internet Protocol
- Module 7: Connectivity Verification
- Module 8: Address Resolution Protocol
- Module 9: The Transport Layer
- Module 10: Network Services
- Module 11: Network Communication Devices
- Module 12: Network Security Infrastructure
- Module 13: Attackers and Their Tools
- Module 14: Common Threats and Attacks
- Module 15: Network Monitoring and Tools
- Module 16: Attacking the Foundation
- Module 17:Attacking What We Do
- Module 18: Understanding Defense
- Module 19: Access Control
- Module 20: Threat Intelligence
- Module 21: Cryptography
- Module 22: Endpoint Protection
- Module 23: Endpoint Vulnerability Assessment
- Module 24: Technologies and Protocols
- Module 25: Network Security Data
- Module 26: Evaluating Alerts
- Module 27: Working with Network Security Data
- Module 28: Digital Forensics and Incident Analysis and Response
Lab Materials
Our slidedecks