{"id":1655,"date":"2024-12-02T10:01:10","date_gmt":"2024-12-02T09:01:10","guid":{"rendered":"https:\/\/shop.uni-pannon.hu\/?post_type=product&#038;p=1655"},"modified":"2026-02-09T12:43:10","modified_gmt":"2026-02-09T11:43:10","slug":"cyberops-associate","status":"publish","type":"product","link":"https:\/\/shop.uni-pannon.hu\/en\/termek\/cyberops-associate\/","title":{"rendered":"CyberOps Associate"},"content":{"rendered":"\n<p>This course prepares participants to monitor security systems as a cybersecurity analyst in a Security Operations Center (SOC), detect cybersecurity attacks and threats, and, when possible, respond to them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Recommended for<\/h3>\n\n\n\n<p>The target audience of the training primarily consists of individuals with basic IT knowledge who are seeking career-oriented, entry-level security analyst skills.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Training Topics<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Understanding Defense<\/li>\n\n\n\n<li>Defense in Depth<\/li>\n\n\n\n<li>Security Policies, Regulations, and Standards<\/li>\n\n\n\n<li>Access Control<\/li>\n\n\n\n<li>Basic Concepts of Access Control, the Use and Functioning of AAA<\/li>\n\n\n\n<li>Threat Detection<\/li>\n\n\n\n<li>Information Sources<\/li>\n\n\n\n<li>Threat Detection Services<\/li>\n\n\n\n<li>Cryptography<\/li>\n\n\n\n<li>Integrity and Authenticity<\/li>\n\n\n\n<li>Confidentiality<\/li>\n\n\n\n<li>Public Key Encryption<\/li>\n\n\n\n<li>Authorities and the PKI Trust System<\/li>\n\n\n\n<li>Applications and Impacts of Cryptography<\/li>\n\n\n\n<li>Endpoint Protection<\/li>\n\n\n\n<li>Malware Protection<\/li>\n\n\n\n<li>Host-based Intrusion Prevention<\/li>\n\n\n\n<li>Application Security (Using Sandboxes for Malware Analysis)<\/li>\n\n\n\n<li>Endpoint Vulnerability Assessment<\/li>\n\n\n\n<li>Network and Server Profiling<\/li>\n\n\n\n<li>Common Vulnerability Scoring System (CVSS)<\/li>\n\n\n\n<li>Secure Device Management<\/li>\n\n\n\n<li>Information Security Management Systems<\/li>\n\n\n\n<li>Technologies and Protocols<\/li>\n\n\n\n<li>Monitoring Common Network Protocols<\/li>\n\n\n\n<li>Impact of Security Technologies on Common Network Protocols<\/li>\n\n\n\n<li>Network Security Data<\/li>\n\n\n\n<li>Types of Security Data<\/li>\n\n\n\n<li>End-Device Logs<\/li>\n\n\n\n<li>Server Logs<\/li>\n\n\n\n<li>Alert Evaluation<\/li>\n\n\n\n<li>Alert Structure<\/li>\n\n\n\n<li>Alert Classification<\/li>\n\n\n\n<li>Working with Network Security Data<\/li>\n\n\n\n<li>Preparing Data for Use in Network Security Monitoring (NSM) Systems<\/li>\n\n\n\n<li>Using Security Onion Tools to Investigate Network Security Events<\/li>\n\n\n\n<li>Learning to Manage Network Monitoring Tools that Improve Workflows<\/li>\n\n\n\n<li>Digital Forensics, Incident Analysis, and Response<\/li>\n\n\n\n<li>Evidence Handling and Attack Attribution<\/li>\n\n\n\n<li>The Cyber Kill Chain Steps<\/li>\n\n\n\n<li>Classifying Attacks Using the Intrusion Analysis Diamond Model<\/li>\n\n\n\n<li>Incident Response (Applying NIST 800-61r2 Incident Response Procedures)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Entry requirements<\/h3>\n\n\n\n<p>Basic IT knowledge.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Expected Duration\/Intensity of the Training<\/h3>\n\n\n\n<p>One semester, in 5 sessions of 8 hours each.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This course prepares participants to monitor security systems as a cybersecurity analyst in a Security Operations Center (SOC), detect cybersecurity attacks and threats, and, when possible, respond to them. Recommended for The target audience of the training primarily consists of individuals with basic IT knowledge who are seeking career-oriented, entry-level security analyst skills. Training Topics [&hellip;]<\/p>\n","protected":false},"featured_media":2285,"template":"","meta":{"_acf_changed":false},"product_brand":[],"product_cat":[56,67,44,68,73],"product_tag":[64,60],"class_list":{"0":"post-1655","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-adult-education","7":"product_cat-english","8":"product_cat-faculty-of-information-technology","9":"product_cat-hungarian","10":"product_cat-science-and-technology","11":"product_tag-hybrid","12":"product_tag-online","14":"first","15":"instock","16":"virtual","17":"sold-individually","18":"taxable","19":"purchasable","20":"product-type-simple"},"acf":[],"_links":{"self":[{"href":"https:\/\/shop.uni-pannon.hu\/en\/wp-json\/wp\/v2\/product\/1655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.uni-pannon.hu\/en\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/shop.uni-pannon.hu\/en\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shop.uni-pannon.hu\/en\/wp-json\/wp\/v2\/media\/2285"}],"wp:attachment":[{"href":"https:\/\/shop.uni-pannon.hu\/en\/wp-json\/wp\/v2\/media?parent=1655"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/shop.uni-pannon.hu\/en\/wp-json\/wp\/v2\/product_brand?post=1655"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/shop.uni-pannon.hu\/en\/wp-json\/wp\/v2\/product_cat?post=1655"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/shop.uni-pannon.hu\/en\/wp-json\/wp\/v2\/product_tag?post=1655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}