Go to Main Content

American University in Cairo

 

HELP | EXIT

Detailed Course Information

 

May 09, 2025
Transparent Image
Information Select the desired Level or Schedule Type to find available classes for the course.

CCNA 112 - Cisco Certified CyberOps Associate
Course Description:
This course enables the learners to install the virtual machines to create a safe environment, the Danger, Operating Systems, network protocols and services. Furthermore, it enables the learners to run the operation of the network infrastructure, various types of network attacks and tools, and to access control, threat Intelligence, common threats and attacks. In addition, it equips the learners with the skills to use network monitoring tools, malicious access to computer networks, cryptography, and to investigate endpoint vulnerabilities and attacks, and endpoint vulnerability assessment. Furthermore, it teaches learners how evaluate network security alerts, and to analyze network intrusion data. Learners, also learn how to apply incident response models to manage network security incidents.

Course Pre-requisites
Working knowledge of the operating systems

Learning Outcomes: Upon successful completion of this course, the student will be able to:
1. Identify the danger, threat actors and Fighters in the War Against Cybercrime.
2. Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
3. Explain the features and characteristics of the Linux Operating System.
4. Analyze the operation of network protocols and services
5. Explain Ethernet, Internet Protocol (IP) and Connectivity Verification.
6. Explain the operation of the ARP, Transport layer, Network Services.
7. Explain Network Security Infrastructure and Network Communication Devices.
8. Classify the various types of network attacks.
9. Use network monitoring tools to identify attacks against network protocols and services.
10. Explain how to prevent malicious access to computer networks, hosts, and data.
11. Identify the Access Control and Threat Intelligence.
12. Explain the impacts of cryptography on network security monitoring.
13. Explain how to investigate endpoint vulnerabilities and attacks.
14. Evaluate network security alerts and Network Security Data.
15. Apply incident response models to manage network security incidents.

7.200 Continuing Education Units
7.200 Lab hours

Levels: Continuing Education
Schedule Types: Lab

SCE Partnership &Programs Department

Restrictions:
Must be enrolled in one of the following Programs:     
      Computer & IT

Return to Previous New Search
Transparent Image
Skip to top of page
Release: 8.7.2.4