Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) - Lab Topology
Lab Topology
- Explore the Windows Operating System
 - Explore the Linux Operating System
 - Explore Endpoint Security
 - Explore TCP/IP Attacks
 - Use NSM Tools to Analyze Data Categories
 - Explore Cryptographic Technologies
 - Investigate Hacker Methodology
 - Investigate Browser-Based Attacks
 - Analyze Suspicious DNS Activity
 - Explore Security Data for Analysis
 - Investigate Suspicious Activity Using Security Onion
 - Hunt Malicious Traffic
 - Cisco XDR to Splunk Enterprise Integration Simulation
 - Correlate Event Logs, PCAPs, and Alerts of an Attack
 - Investigate Advanced Persistent Threats
 - Explore SOC Playbooks