BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
METHOD:REQUEST
BEGIN:VEVENT
UID:69f37f6dbe610
DTSTART:20250908T000000Z
DTEND:20250912T000000Z
DTSTAMP:20250908T000000Z
ORGANIZER;CN=IPnetON GmbH:mailto:info@ipneton.com
CREATED:20260430T161229Z
DESCRIPTION:*Instructor-led Classroom Training &amp\; *Instructor-led Online / hybrid trainingCourse overviewPerforming CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 What you’ll learn in this courseThe Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity operations fundamentals\, methods\, and automation.The knowledge you gain in this course will prepare you for the role of Information Security Analyst on a Security Operations Center (SOC) team. You will learn foundational concepts and their application in real-world scenarios\, and how to leverage playbooks in formulating an Incident Response (IR). The course teaches you how to use automation for security using cloud platforms and a SecDevOps methodology. You will learn the techniques for detecting cyberattacks\, analyzing threats\, and making appropriate recommendations to improve cybersecurity.This course also earns you 40 Continuing Education (CE) credits towards recertification and prepares you for the 350-201 CBRCOR core exam.Course duration ● Instructor-led training: 5 days in the classroom with hands on practiceHow you’ll benefit This course will help you: ● Gain an advanced understanding of the tasks involved for senior-level roles in a security operations center ● Configure common tools and platforms used by security operation teams via practical application ● Prepare you to respond like a hacker in real-life attack scenarios and submit recommendations to senior management ● Prepare for the 350-201 CBRCOR core exam ● Earn 40 CE credits toward recertificationThe exam will test for knowledge in the following areas: ● Monitoring for cyberattacks ● Analyzing high volume of data using automation tools and platforms—both open source and commercial ● Accurately identifying the nature of attack and formulate a mitigation plan ● Scenario-based questions\; for example\, using a screenshot of output from a tool\, you may be asked to interpret portions of output and establish conclusions
LAST-MODIFIED:20250908T000000Z
LOCATION:
SUMMARY:CyberOps Professional (CBRCOR 350-201)   
SEQUENCE:0
TRANSP:OPAQUE
END:VEVENT
END:VCALENDAR