CSOa:CCNACybersecurityOperations
Class Schedule – summer semester 2022/2023
Module | Group 1, 2 |
---|---|
Cybersecurity and the Security Operations Center | 7. 2., 9. 2. |
Forensics of Windows Operating System | 14. 2., 16. 2. |
Forensics of Linux Operating System | 21. 2., 23. 2. |
Overview of Network Protocols and Services + Security Concerns of Network Infrastructure | 28. 2., 2. 3. |
Principles of Network Security | 7. 3., 9. 3. |
AVAST: Ransomware Analysis Workshop | 14. 3., 16. 3. |
Cryptography and the Public Key Infrastructure | 21. 3., 23. 3. |
Network Attacks: A Deeper Look + Protecting the Network | 28. 3., 30. 3. |
Endpoint Security and Analysis + Security Monitoring | 4. 4., 6. 4. |
NÚKIB: Incident Response and Handling | 11. 4., 13. 4. |
EOSecurity | 18. 4., 20. 4. |
Intrusion Data Analysis | 25. 4.. 27. 4. |
Skills + Final | 2. 5., 4. 5. |
Important course links
- Official course annotation https://www.fit.vut.cz/study/course/259544/
Lecturers
- Ing. Matěj Grégr, Ph.D.
- Ing. Vladimír Veselý, Ph.D.
- Ing. Nelson Mutua, MSc.
- Ing. Daniel Dolejška
Labs
- Laboratory room Cisco, C304
- Terms:
- Group 1 – every Tuesday from 11:00 to 15:00
- Group 2 – every Thursday from 11:00 to 15:00
Assessments
- active participation in labs (max. 26 points)
- two challenge labs (max. 20 points)
- final configuration practice test and test on theoretical skills (max. 54 points)
In order to pass this course, you need to:
- participate in all laboratory exercises
- get at least half of the points from each activity
In order to obtain official Cisco Certificate of Course Completation, you need to achieve at least 80% from all assessments.
There is no way how to substitute missing class.
Official slides
- Module 1: The Danger
- Module 2: Fighters in the War Against Cybercrime
- Module 3: The Windows Operating System
- Module 4: Linux Overview
- Module 5: Network Protocols
- Module 6: Ethernet and Internet Protocol
- Module 7: Connectivity Verification
- Module 8: Address Resolution Protocol
- Module 9: The Transport Layer
- Module 10: Network Services
- Module 11: Network Communication Devices
- Module 12: Network Security Infrastructure
- Module 13: Attackers and Their Tools
- Module 14: Common Threats and Attacks
- Module 15: Network Monitoring and Tools
- Module 16: Attacking the Foundation
- Module 17:Attacking What We Do
- Module 18: Understanding Defense
- Module 19: Access Control
- Module 20: Threat Intelligence
- Module 21: Cryptography
- Module 22: Endpoint Protection
- Module 23: Endpoint Vulnerability Assessment
- Module 24: Technologies and Protocols
- Module 25: Network Security Data
- Module 26: Evaluating Alerts
- Module 27: Working with Network Security Data
- Module 28: Digital Forensics and Incident Analysis and Response
Lab Materials