Skill Assessment
Skill assessment | 20 questions
See how your CCNA Cyber Ops skills stack up against other professionals in your field.
CCNA Cyber Ops Custom Practice Exam
Custom practice exam | 120 questions
Prepare for your CCNA Cyber Ops exams and test your domain knowledge.
Introduction to CCNA Cyber Ops
Course | 10 minutes
This course prepares you for your CCNA Cyber Ops training. You’ll follow along with the course examples and set up your own cybersecurity lab with Kali Linux, which is commonly used for digital forensics and penetration testing.
Network Concepts
Course | 44 minutes
Networks can be complex, confusing and tricky. With this course, you’ll dive into the devices and protocols used in networking, getting to grips with the basics of what you’ll need to know for a successful security analyst career.
Security Concepts
Course | 23 minutes
In this course, you’ll get a closer introduction to some of the basic security concepts and tools that will help you later on in the CCNA Cyber Ops Learning Path — and in the rest of your career!
Cryptography
Course | 15 minutes
This course will help you understand the differences between things like encryption, hashing and certificates, making it easier for you to understand the intricacies of data protection.
Host-Based Analysis
Course | 39 minutes
In this course, you’ll get to grips with the complexities and challenges of host-based analysis. You’ll look at HBA on Microsoft and Linux, including endpoint protection, blacklisting, systems-based sandboxing and more.
Security Monitoring
Course | 20 minutes
The best offense is a good defense … or is it the other way around? In this course, you will learn how to stop a problem before it starts by detecting potential threats with security monitoring software features.
Attack Method
Course | 28 minutes
The war between hackers and security experts is ongoing, and the weapons are always evolving. In this course, you’ll learn the about different strategies used by hackers to attack a network and cause damage.
Endpoint Threat Analysis and Computer Forensics
Course | 17 minutes
In this course, you’ll get a chance to explore some of the details of computer forensics. You’ll take a closer look at Common Vulnerability Scoring System (CVSS) 3.0, Microsoft Windows and Linux file systems, evidence handling and more.
Network Intrusion Analysis
Course | 16 minutes
In this course, you’ll discover the types of information that you want to look for during network intrusion analysis. You’ll get a look at security analysis with Wireshark, NetFlow version 5 and security events, impact flags and more.
Incident Response and Handling
Course | 30 minutes
How you respond to an incident may mean the difference between safety or disaster on a network level. In this course, you’ll be introduced to security frameworks and regulations that affect your incident response, including NIST and HIPAA.
Data and Event Analysis
Course | 17 minutes
Once you have the data, you need to analyze it. Explore the details of data and event analysis, including retrospective analysis, data normalization and threat analysis.
Skill Assessment
Skill assessment | 20 questions
See how your CCNA Cyber Ops skills stack up against other professionals in your field.
CCNA Cyber Ops Custom Practice Exam
Custom practice exam | 120 questions
Prepare for your CCNA Cyber Ops exams and test your domain knowledge.
Introduction to CCNA Cyber Ops
Course | 10 minutes
This course prepares you for your CCNA Cyber Ops training. You’ll follow along with the course examples and set up your own cybersecurity lab with Kali Linux, which is commonly used for digital forensics and penetration testing.
Network Concepts
Course | 44 minutes
Networks can be complex, confusing and tricky. With this course, you’ll dive into the devices and protocols used in networking, getting to grips with the basics of what you’ll need to know for a successful security analyst career.
Security Concepts
Course | 23 minutes
In this course, you’ll get a closer introduction to some of the basic security concepts and tools that will help you later on in the CCNA Cyber Ops Learning Path — and in the rest of your career!
Cryptography
Course | 15 minutes
This course will help you understand the differences between things like encryption, hashing and certificates, making it easier for you to understand the intricacies of data protection.
Host-Based Analysis
Course | 39 minutes
In this course, you’ll get to grips with the complexities and challenges of host-based analysis. You’ll look at HBA on Microsoft and Linux, including endpoint protection, blacklisting, systems-based sandboxing and more.
Security Monitoring
Course | 20 minutes
The best offense is a good defense … or is it the other way around? In this course, you will learn how to stop a problem before it starts by detecting potential threats with security monitoring software features.
Attack Method
Course | 28 minutes
The war between hackers and security experts is ongoing, and the weapons are always evolving. In this course, you’ll learn the about different strategies used by hackers to attack a network and cause damage.
Endpoint Threat Analysis and Computer Forensics
Course | 17 minutes
In this course, you’ll get a chance to explore some of the details of computer forensics. You’ll take a closer look at Common Vulnerability Scoring System (CVSS) 3.0, Microsoft Windows and Linux file systems, evidence handling and more.
Network Intrusion Analysis
Course | 16 minutes
In this course, you’ll discover the types of information that you want to look for during network intrusion analysis. You’ll get a look at security analysis with Wireshark, NetFlow version 5 and security events, impact flags and more.
Incident Response and Handling
Course | 30 minutes
How you respond to an incident may mean the difference between safety or disaster on a network level. In this course, you’ll be introduced to security frameworks and regulations that affect your incident response, including NIST and HIPAA.
Data and Event Analysis
Course | 17 minutes
Once you have the data, you need to analyze it. Explore the details of data and event analysis, including retrospective analysis, data normalization and threat analysis.