We may earn an affiliate commission when you visit our partners.
Course image
Cisco Learning & Certifications

If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you explore data type categories in context to network security analytics.

By the end of the course, you will be able to:

• Explain the data that is available to the network security analysis •Describe the various types of data used in monitoring network security

• Describe the deployment and use of SIEMs to collect, sort, process, prioritize, store, and report alarms

• Describe the functions of SOAR platforms and features of Cisco SecureX

Read more

If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you explore data type categories in context to network security analytics.

By the end of the course, you will be able to:

• Explain the data that is available to the network security analysis •Describe the various types of data used in monitoring network security

• Describe the deployment and use of SIEMs to collect, sort, process, prioritize, store, and report alarms

• Describe the functions of SOAR platforms and features of Cisco SecureX

•Describe the Security Onion Open Source security monitoring tool

• Explain how packet capture data is stored in the PCAP format and the storage requirements for full packet capture.

• Describe packet capture usage and benefits for investigating security incidents • Describe packet captures using tools such as Tcpdump

• Describe session data content and provide an example of session data

•Describe transaction data content and provide an example of transaction data z

• Describe alert data content and provide an example of alert data

•Describe other types of NSM data (extracted content, statistical data, and metadata)

•Explain the need to correlate NSM data and provide an example

•Describe the Information Security CIA triad

• Understand PII as it relates to information security

• Describe compliance regulations and their effects on an organization

• Describe intellectual property and the importance of protecting it

• Use various tool capabilities of the Security Onion Linux distribution

To be successful in this course, you should have the following background:

1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course

2. Familiarity with Ethernet and TCP/IP networking

3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.

Enroll now

What's inside

Syllabus

Exploring Data Type Categories
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you explore data type categories in context to network security analytics. By the end of the course, you will be able to: • Explain the data that is available to the network security analysis •Describe the various types of data used in monitoring network security • Describe the deployment and use of SIEMs to collect, sort, process, prioritize, store, and report alarms • Describe the functions of SOAR platforms and features of Cisco SecureX • Describe the Security Onion Open Source security monitoring tool• Explain how packet capture data is stored in the PCAP format and the storage requirements for full packet capture.• Describe packet capture usage and benefits for investigating security incidents • Describe packet captures using tools such as Tcpdump • Describe session data content and provide an example of session data• Describe transaction data content and provide an example of transaction data • Describe alert data content and provide an example of alert data• Describe other types of NSM data (extracted content, statistical data, and metadata)• Explain the need to correlate NSM data and provide an example• Describe the Information Security CIA triad • Understand PII as it relates to information security • Describe compliance regulations and their effects on an organization • Describe intellectual property and the importance of protecting it • Use various tool capabilities of the Security Onion Linux distribution To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.
Read more
Understanding Basic Cryptography Concepts
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you understand Basic Cryptography Concepts By the end of the course, you will be able to: • Describe the impact of cryptography on security investigations • Describe cryptography concepts • Describe hashing mechanisms and algorithms • Describe encryption usage and features • Describe the use of cryptanalysis to break codes to decipher encrypted data • Describe the use of symmetric encryption algorithms • Describe the use of asymmetric cryptographic algorithms • Describe the Diffie-Hellman (DH) key agreement and DH groups• Describe the uses of the SSH protocol• Describe the basic security services offered with the use of digital signatures• Describe PKI components and use • Describe PKI operations • Describe a use case for SSL/TLS • Describe cipher suite concepts• Describe key management for the secure generation, verification, exchange, storage, and destruction of keys • Describe NSA Suite B cryptographic algorithms • Work with various cryptographic technologies such as public-key infrastructure (PKI), digital signatures, asymmetric encryption, and hashing • Describe the basic concepts and uses of cryptography. To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Core audience is associate-level cybersecurity analysts who are working in security operation centers
Helps learners explore data type categories and their use in network security analytics
Taught by Cisco Learning & Certifications, who are recognized for their work in cybersecurity
Covers various aspects of network security analytics, including data types, tools, and techniques
Provides a foundation for understanding the role of data in network security monitoring and analysis
May require familiarity with Ethernet and TCP/IP networking, Windows and Linux operating systems, and basics of networking security concepts

Save this course

Save Data Security to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Data Security with these activities:
Organize and review your notes and course materials
Taking the time to compile and review your notes and course materials can help you solidify your understanding of the concepts covered in the course.
Show steps
  • Gather your notes, assignments, quizzes, and exams.
  • Organize your materials by topic or module.
  • Review your materials regularly to reinforce your understanding.
Review basic networking concepts
Having a strong foundation in basic networking concepts will help you better understand the concepts covered in this course.
Browse courses on Networking
Show steps
  • Review your notes from previous networking courses or read online resources.
  • Participate in online forums or discussion groups to ask questions and engage with other learners.
  • Complete practice exercises or quizzes to test your understanding.
Join a study group or participate in peer review sessions
Study groups and peer review sessions can provide a supportive environment for learning, where you can collaborate with others, share knowledge, and receive feedback on your work.
Show steps
  • Find a study group or peer review session that aligns with your interests.
  • Attend the sessions regularly and actively participate in discussions.
  • Share your knowledge and insights with others.
  • Seek feedback on your work from your peers.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Read 'Cryptography and Network Security: Principles and Practice'
This book provides a comprehensive overview of cryptography and network security, covering both the fundamental concepts and practical applications.
Show steps
  • Read through the book, taking notes as you go.
  • Complete the practice exercises at the end of each chapter.
  • Summarize the key concepts of each chapter in your own words.
Attend industry meetups and conferences
Attending industry meetups and conferences can help you connect with other professionals in your field, learn about the latest trends in network security, and gain valuable insights from speakers and vendors.
Browse courses on Networking
Show steps
  • Identify industry meetups and conferences that are relevant to your interests.
  • Register for the events and plan your attendance.
  • Network with other attendees and speakers.
  • Attend presentations and workshops to learn about the latest trends.
Follow tutorials on using network security tools
By following tutorials on using network security tools, you can gain hands-on experience with these tools and learn how to use them effectively to monitor and protect your network.
Browse courses on network security
Show steps
  • Identify a network security tool that you want to learn more about.
  • Search for tutorials on using that tool.
  • Follow the steps in the tutorial to set up and use the tool.
  • Experiment with the tool to gain a deeper understanding of its capabilities.
Participate in hands-on workshops
Hands-on workshops provide an excellent opportunity to gain practical experience with network security tools and techniques, and to learn from experienced professionals.
Browse courses on Security
Show steps
  • Research and identify hands-on workshops that align with your interests.
  • Register for the workshops and prepare for the sessions.
  • Actively participate in the workshops and ask questions.
  • Apply the knowledge and skills you gained in the workshops to your work.
Practice your encryption skills
By practicing your encryption skills, you can build your confidence and fluency, improving your ability to use encryption effectively in real-world scenarios.
Browse courses on Cryptography
Show steps
  • Set up a free account on a coding platform like LeetCode or HackerRank.
  • Find practice problems related to encryption.
  • Attempt to solve the problems on your own.
  • Review your solutions and identify areas for improvement.

Career center

Learners who complete Data Security will develop knowledge and skills that may be useful to these careers:
Cryptographer
A Cryptographer develops and uses techniques for encrypting and decrypting information. They use a variety of mathematical and computational techniques to protect information from unauthorized access, use, disclosure, disruption, modification, or destruction. A course would help build a foundation of cryptography concepts and prepare you for a job as a Cryptographer.
Information Security Analyst
An Information Security Analyst plans and implements security measures to protect an organization's computer networks and systems. They investigate security breaches and make recommendations for improving security. A course would help build a foundation of data security concepts and prepare you for a job as an Information Security Analyst.
Security Manager
A Security Manager is responsible for the overall security of an organization's computer networks and systems. They develop and implement security policies and procedures, and they oversee the implementation of security measures. A course would help build a foundation of data security concepts and prepare you for a job as a Security Manager.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to improve their security posture. They may also design and implement security measures to protect an organization's computer networks and systems. A course would help build a foundation of data security concepts and prepare you for a job as a Security Consultant.
Security Analyst
A Security Analyst investigates security breaches and makes recommendations for improving security. They may also design and implement security measures to protect an organization's computer networks and systems. A course would help build a foundation of data security concepts and prepare you for a job as a Security Analyst.
Security Operations Center (SOC) Analyst
A Security Operations Center (SOC) Analyst monitors and analyzes security data to identify and respond to security breaches. They may also investigate security incidents and make recommendations for improving security. A course would help build a foundation of network security concepts and prepare you for a job as a SOC Analyst.
Network Security Specialist
A Network Security Specialist designs, implements, and maintains the security of computer networks. They protect against unauthorized access, use, disclosure, disruption, modification, or destruction of information. A course would help build a foundation of network security concepts and prepare you for a job as a Network Security Specialist.
Security Engineer
A Security Engineer designs, implements, and maintains the security of computer networks and systems. They protect against unauthorized access, use, disclosure, disruption, modification, or destruction of information. A course would help build a foundation of network security concepts and prepare you for a job as a Security Engineer.
Cybersecurity Engineer
A Cybersecurity Engineer designs, implements, and maintains the security of computer networks and systems. They protect against unauthorized access, use, disclosure, disruption, modification, or destruction of information. A course would help build a foundation of network security concepts and prepare you for a job as a Cybersecurity Engineer.
Penetration Tester
A Penetration Tester attempts to gain unauthorized access to a computer network or system to identify security vulnerabilities. They use a variety of techniques to test the security of networks and systems. A course would help build a foundation of network security concepts and prepare you for a job as a Penetration Tester.
Vulnerability Manager
A Vulnerability Manager identifies, assesses, and mitigates vulnerabilities in computer networks and systems. They use a variety of tools and techniques to identify and assess vulnerabilities, and they make recommendations for mitigating those vulnerabilities. A course would help build a foundation of network security concepts and prepare you for a job as a Vulnerability Manager.
Cybercrime Investigator
A Cybercrime Investigator investigates cybercrimes, such as computer hacking, identity theft, and online fraud. They use a variety of techniques to investigate cybercrimes and gather evidence. A course may be useful in providing a foundation of network security concepts.
Malware Analyst
A Malware Analyst analyzes malware, such as viruses, worms, and Trojans. They use a variety of techniques to analyze malware and identify its behavior. A course may be useful in providing a foundation of network security concepts.
Digital Forensics Analyst
A Digital Forensics Analyst recovers and analyzes digital evidence from computers and other electronic devices. They use a variety of techniques to recover and analyze digital evidence, and they provide expert testimony in court. A course may be useful in providing a foundation of network security concepts.
Privacy Analyst
A Privacy Analyst develops and implements policies and procedures to protect the privacy of individuals. They also advise organizations on how to comply with privacy laws and regulations. A course may be useful in providing a foundation of data security concepts.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Data Security.
This comprehensive book covers cryptographic algorithms, protocols, and applications. It complements the course's introduction to cryptography by providing a deeper understanding of the mathematical principles and practical implementations of cryptographic techniques.
Provides a comprehensive overview of security engineering principles and practices. It complements the course's focus on data security by offering a broader perspective on designing and implementing secure systems.
Offers a practical approach to malware analysis, covering techniques for identifying, analyzing, and mitigating malicious software. It complements the course's exploration of security incidents by providing hands-on experience in dealing with real-world malware threats.
Provides a practical guide to network security monitoring, covering topics such as intrusion detection systems, log analysis, and incident response. It complements the course's focus on monitoring network security by offering real-world insights and best practices.
Delves into the technical details of network security, covering topics such as firewalls, intrusion detection systems, and cryptography. It complements the course's focus on network security analytics by providing a deeper understanding of underlying technologies.
This textbook provides a comprehensive overview of computer security concepts and practices. It serves as a valuable reference for learners seeking a broader understanding of the field, complementing the course's focus on data security with a more general perspective.
This practical guide provides a step-by-step approach to network security assessment. It aligns with the course's emphasis on monitoring network security by offering tools and techniques for identifying vulnerabilities and mitigating risks.
Offers insights into the human element of security, covering topics such as social engineering and psychological manipulation. It complements the course's exploration of data security by highlighting the importance of understanding and mitigating human vulnerabilities.
Provides a practical guide to security risk management, covering topics such as risk assessment, mitigation, and compliance. It complements the course's focus on data security by offering a broader perspective on managing security risks in organizations.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser