{"id":1655,"date":"2024-12-02T10:01:10","date_gmt":"2024-12-02T09:01:10","guid":{"rendered":"https:\/\/shop.uni-pannon.hu\/?post_type=product&#038;p=1655"},"modified":"2026-02-09T12:43:10","modified_gmt":"2026-02-09T11:43:10","slug":"cyberops-associate","status":"publish","type":"product","link":"https:\/\/shop.uni-pannon.hu\/hu\/termek\/cyberops-associate\/","title":{"rendered":"CyberOps Associate"},"content":{"rendered":"<p>Jelen kurzus felk\u00e9sz\u00edti a r\u00e9sztvev\u0151ket, hogy egy biztons\u00e1gi m\u0171veleti k\u00f6zpont (SOC) kiberbiztons\u00e1gi elemz\u0151jek\u00e9nt monitorozz\u00e1k a biztons\u00e1gi rendszereket, \u00e9szlelj\u00e9k a kiberbiztons\u00e1gi t\u00e1mad\u00e1sokat \u00e9s fenyeget\u00e9seket, illetve lehet\u0151s\u00e9g szerint reag\u00e1ljanak azokra.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Kinek aj\u00e1nljuk<\/h3>\n\n\n\n<p>A k\u00e9pz\u00e9s c\u00e9lcsoportj\u00e1t els\u0151sorban olyan IT-alapismeretekkel rendelkez\u0151 szem\u00e9lyek adj\u00e1k, akik karrierorient\u00e1lt, bel\u00e9p\u0151 szint\u0171 biztons\u00e1gi elemz\u0151i k\u00e9szs\u00e9geket keresnek.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A k\u00e9pz\u00e9s tematik\u00e1ja<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A v\u00e9delem meg\u00e9rt\u00e9se<\/li>\n\n\n\n<li>M\u00e9lys\u00e9gi v\u00e9delem<\/li>\n\n\n\n<li>Biztons\u00e1gi ir\u00e1nyelvek, el\u0151\u00edr\u00e1sok \u00e9s szabv\u00e1nyok<\/li>\n\n\n\n<li>Hozz\u00e1f\u00e9r\u00e9s-vez\u00e9rl\u00e9s<\/li>\n\n\n\n<li>A hozz\u00e1f\u00e9r\u00e9s-vez\u00e9rl\u00e9s alapfogalmai, a AAA haszn\u00e1lata \u00e9s m\u0171k\u00f6d\u00e9se<\/li>\n\n\n\n<li>Fenyeget\u00e9sek felder\u00edt\u00e9se<\/li>\n\n\n\n<li>Inform\u00e1ci\u00f3forr\u00e1sok<\/li>\n\n\n\n<li>Fenyeget\u00e9s-felder\u00edt\u00e9si szolg\u00e1ltat\u00e1sok<\/li>\n\n\n\n<li>Kriptogr\u00e1fia<\/li>\n\n\n\n<li>Integrit\u00e1s \u00e9s hiteless\u00e9g<\/li>\n\n\n\n<li>Bizalmass\u00e1g<\/li>\n\n\n\n<li>Nyilv\u00e1nos kulcs\u00fa titkos\u00edt\u00e1s<\/li>\n\n\n\n<li>Hat\u00f3s\u00e1gok \u00e9s a PKI bizalmi rendszere<\/li>\n\n\n\n<li>A kriptogr\u00e1fia alkalmaz\u00e1sai \u00e9s hat\u00e1sai<\/li>\n\n\n\n<li>V\u00e9gpontok v\u00e9delme<\/li>\n\n\n\n<li>K\u00e1rt\u00e9kony programok elleni v\u00e9delem<\/li>\n\n\n\n<li>Hoszt-alap\u00fa behatol\u00e1s-megel\u0151z\u00e9s<\/li>\n\n\n\n<li>Alkalmaz\u00e1sbiztons\u00e1g (sandbox haszn\u00e1lata a k\u00e1rt\u00e9kony prgoramok elemz\u00e9s\u00e9re)<\/li>\n\n\n\n<li>V\u00e9gpontok s\u00e9r\u00fcl\u00e9kenys\u00e9gvizsg\u00e1lata<\/li>\n\n\n\n<li>H\u00e1l\u00f3zat- \u00e9s szerverprofiloz\u00e1s<\/li>\n\n\n\n<li>K\u00f6z\u00f6s sebezhet\u0151s\u00e9gi pontoz\u00e1si rendszer (CVSS)<\/li>\n\n\n\n<li>Biztons\u00e1gos eszk\u00f6zkezel\u00e9s<\/li>\n\n\n\n<li>Inform\u00e1ci\u00f3biztons\u00e1gi ir\u00e1ny\u00edt\u00e1si rendszerek<\/li>\n\n\n\n<li>Technol\u00f3gi\u00e1k \u00e9s protokollok<\/li>\n\n\n\n<li>Az elterjedt h\u00e1l\u00f3zati protokollok fel\u00fcgyelete<\/li>\n\n\n\n<li>A biztons\u00e1gi technol\u00f3gi\u00e1k hat\u00e1sa az elterjedt h\u00e1l\u00f3zati protokollokra<\/li>\n\n\n\n<li>H\u00e1l\u00f3zatbiztons\u00e1gi adatok<\/li>\n\n\n\n<li>A biztons\u00e1gi adatok t\u00edpusai<\/li>\n\n\n\n<li>V\u00e9gberendez\u00e9sek napl\u00f3i<\/li>\n\n\n\n<li>Szervernapl\u00f3k<\/li>\n\n\n\n<li>Riaszt\u00e1sok ki\u00e9rt\u00e9kel\u00e9se<\/li>\n\n\n\n<li>A riaszt\u00e1sok strukt\u00far\u00e1ja<\/li>\n\n\n\n<li>A riaszt\u00e1sok oszt\u00e1lyoz\u00e1sa<\/li>\n\n\n\n<li>A h\u00e1l\u00f3zatbiztons\u00e1gi adatokkal v\u00e9gzett munka<\/li>\n\n\n\n<li>Az adatok el\u0151k\u00e9sz\u00edt\u00e9se a h\u00e1l\u00f3zatbiztons\u00e1gi fel\u00fcgyelet (NSM) rendszerben val\u00f3 felhaszn\u00e1l\u00e1sra<\/li>\n\n\n\n<li>A Security Onion eszk\u00f6z\u00f6k haszn\u00e1lata a h\u00e1l\u00f3zatbiztons\u00e1gi esem\u00e9nyek vizsg\u00e1lat\u00e1hoz<\/li>\n\n\n\n<li>A munkafolyamatokat jav\u00edt\u00f3 h\u00e1l\u00f3zatmonitoroz\u00f3 eszk\u00f6z\u00f6k kezel\u00e9s\u00e9nek megismer\u00e9se<\/li>\n\n\n\n<li>Digit\u00e1lis nyomelemz\u00e9s, valamint incidenselemz\u00e9s \u00e9s -kezel\u00e9s<\/li>\n\n\n\n<li>Bizony\u00edt\u00e9kkezel\u00e9s \u00e9s t\u00e1mad\u00e1s-attrib\u00faci\u00f3<\/li>\n\n\n\n<li>A kibergyilkoss\u00e1gi l\u00e1nc (Cyber Kill Chain) l\u00e9p\u00e9sei<\/li>\n\n\n\n<li>A t\u00e1mad\u00e1s oszt\u00e1lyoz\u00e1sa a behatol\u00e1selemz\u00e9s gy\u00e9m\u00e1ntmodellj\u00e9nek seg\u00edts\u00e9g\u00e9vel<\/li>\n\n\n\n<li>Incidenskezel\u00e9s (az NIST 800-61r2 incidenskezel\u00e9si elj\u00e1r\u00e1sokalkalmaz\u00e1sa)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">A k\u00e9pz\u00e9s r\u00e9szv\u00e9teli felt\u00e9telei (szakmai el\u0151k\u00e9pzetts\u00e9g)<\/h3>\n\n\n\n<p>Informatikai alapismeretek.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A k\u00e9pz\u00e9s v\u00e1rhat\u00f3 hossza\/intenzit\u00e1sa<\/h3>\n\n\n\n<p>Egy f\u00e9l\u00e9v, 5 x 8 \u00f3r\u00e1s blokkokban.<\/p>","protected":false},"excerpt":{"rendered":"<p>This course prepares participants to monitor security systems as a cybersecurity analyst in a Security Operations Center (SOC), detect cybersecurity attacks and threats, and, when possible, respond to them. Recommended for The target audience of the training primarily consists of individuals with basic IT knowledge who are seeking career-oriented, entry-level security analyst skills. Training Topics [&hellip;]<\/p>\n","protected":false},"featured_media":2285,"template":"","meta":{"_acf_changed":false},"product_brand":[],"product_cat":[56,67,44,68,73],"product_tag":[64,60],"class_list":{"0":"post-1655","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-adult-education","7":"product_cat-english","8":"product_cat-faculty-of-information-technology","9":"product_cat-hungarian","10":"product_cat-science-and-technology","11":"product_tag-hybrid","12":"product_tag-online","14":"first","15":"instock","16":"virtual","17":"sold-individually","18":"taxable","19":"purchasable","20":"product-type-simple"},"acf":[],"_links":{"self":[{"href":"https:\/\/shop.uni-pannon.hu\/hu\/wp-json\/wp\/v2\/product\/1655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.uni-pannon.hu\/hu\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/shop.uni-pannon.hu\/hu\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shop.uni-pannon.hu\/hu\/wp-json\/wp\/v2\/media\/2285"}],"wp:attachment":[{"href":"https:\/\/shop.uni-pannon.hu\/hu\/wp-json\/wp\/v2\/media?parent=1655"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/shop.uni-pannon.hu\/hu\/wp-json\/wp\/v2\/product_brand?post=1655"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/shop.uni-pannon.hu\/hu\/wp-json\/wp\/v2\/product_cat?post=1655"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/shop.uni-pannon.hu\/hu\/wp-json\/wp\/v2\/product_tag?post=1655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}