Shopping Cart  [0]

Call 800.698.5501

Cisco Cybersecurity Specialist - 600-199 SCYBER Certification

Cisco CCNA Security Certification Training
TrainingCamp Twitter Feed

Cisco Cybersecurity Specialist

Our 4-day Cisco Cybersecurity Specialist Boot Camp is a lab-based course that covers cybersecurity concepts such as how to recognize specific threats and attacks on your network. You will learn how a network security operations center (SOC) works and how to begin to monitor, analyze, and respond to security threats within the network.

This course prepares you for the following exam:
Securing Cisco Networks with Threat Detection and Analysis
600-199 SCYBER

This program is designed for IT professionals who need to know how to monitor, analyze, and respond to network security threats and attacks.

Enrollment Information

CCNA Sec Training Pricing View Pricing
CCNA Sec Certification Schedule Course Schedule

SCYBER

Duration: 4 days
Exam Voucher: Included
GSA Catalog: GS-02F-0044T

Other Delivery Formats

Private Group Training

  • Exam Preparation Study Guide
  • Customized Practice Exams
  • Training Camp Education Guarantee

  • Cisco Exam Voucher
  • Self-Paced Video Lectures (Pre-Class)
  • Evening Exam Prep Review

  • Self-Paced Online
    Check out our full listing of Cisco Self-Paced Online courses that can be taken anywhere, online


    Post 9/11 G.I. Bill
    These benefits may cover up to 100% of tuition, courseware, lodging, testing and other training-related costs as well.


    Onsite Group Training
    Training Camp offers Cisco exam training with onsite examination delivery anywhere in the world.



    Training Camp pioneered the first exam-focused Cisco Certification Training Program "Boot Camp" in 1998, and has since successfully certified thousands of Cisco Networking Professionals. Our award-winning hands-on extended-hour CCNA Boot Camps include access to proprietary practice labs, unlimited retakes of your class, and onsite vendor exams, so you will leave certified.


    Cisco CCNA Courseware
    Award Winning Cisco Security Courseware
    *Training Camp Exclusive Feature

    Our proprietary courseware is designed by our extensive team of subject matter experts, constantly incorporating feedback from our thousands of alumni students.

    Cisco CCNA Instructors
    Pre & Post Class Learning Tools
    *Training Camp Exclusive Feature

    Our program accommodates every student's level of learning need by providing over 30 hours of pre-class networking study videos and 1-year access to industry-leading Boson Netsim ™, an application that simulates Cisco Systems' networking hardware and software and is designed to aid the user in learning the Cisco IOS command structure.


    Cisco CCNA Exam Practice Tests
    Detailed Evening Review & Realistic Practice Exams
    *Training Camp Exclusive Feature

    Our Cisco Cybersecurity Specialist training program includes value-added evening review sessions & constantly updated practice exam review drills - representative of the actual exam questions delivered during the official certification test. These practice exams are not designed by an outside vendor without update control. Our trainers work on this question pool weekly, based on current student feedback.



    What is the Cisco Cybersecurity Specialist?

    Designed for professional security analysts, the Cisco Cybersecurity Specialist certification validates your knowledge of event monitoring, security event/alarm/traffic analysis, and incident response, and it confirms your knowledge of and ability to use the features of Cisco and other current network security products.

    How long is my Cisco Cybersecurity Specialistcertification good for?

    Cisco Cybersecurity Specialist certification is valid for two years.

    Is this certification popular?

    The United States Department of Defense has certified the Cisco Cybersecurity Specialist Certification as DoD 8570.01-M compliant. The DoD 8570 Directive provides guidance and procedures for the training, certification and management of all DoD employees performing Information Assurance functions in their line of duty. These individuals are required to carry an approved certification for their particular job role and classification

    Based on the Information Assurance Workforce Improvement Program Advisory Council Certification Committee's recommendation, SCYBER has been approved under CSSP Analyst and CSSP Incident Responder sections.

    Cisco Cybersecurity Specialist Course Outline

    Information Gathering and Security Foundations

    Describe basic network topologies, application architecture, and host configuration standards
    Identify the services a network and security operations center offers to an organization
    Describe traditional hacking techniques
    Describe basic operational procedures and incident response processes of a security operations center
    Describe basic network security events
    Describe mission-critical network traffic and functions, applications, services, and device behaviors
    Describe corporate security policies
    Describe the role of a network security analyst
    Describe the primary sources of data on vendor vulnerabilities, current threats, exploits, and active attacks
    Describe how vulnerability, attack, and threat data impact operations
    Describe the baseline of a network profile
    Describe correlation baselines (use NetFlow output to validate normal traffic vs. non-normal)
    Describe security around local business process and infrastructure and applications
    Describe risk analysis mitigation

    Event Monitoring

    Describe the various sources of data and how they relate to network security issues
    Monitor the collection of network data as it relates to network security issues
    Monitor and validate health state and availability of devices
    Monitor DNS query log output (monitor telemetry data to validate devices)
    Identify a security incident (single or recurrent)
    Describe the best practices for evidence collection and forensic analysis
    Describe the different types and severity of alarms and events

    Security Events and Alarms

    Identify and dismiss false positive indicators correctly
    Describe event correlation within the context of the various alarms and corporate infrastructure architecture
    Assess traffic and events in relation to stated policies
    Identify actionable events
    Identify basic incident types
    Describe event metrics and diagnostic procedures

    Traffic Analysis, Collection, and Correlation

    Describe IP packet structures
    Describe TCP and UDP header information
    Analyze network traces or TCP dumps and trace back to actual activities
    Describe packet analysis in IOS
    Describe access packets in IOS
    Acquire network traces
    Configure packet capture

    Incident Response

    Describe standard corporate incident response procedure and escalation policies
    Identify necessary changes to enhance the existing procedure, policy, and decision tree
    Describe the basic emergency mitigation of high-level threats, exploits, and vulnerabilities
    Evaluate and recommend responses to vulnerabilities to ensure adequate monitoring response and mitigation
    Assist level 2 incident response team to mitigate issues
    Describe best practices for post-event investigation
    Describe common legal and compliance issues in security event handling

    Operational Communications

    Describe the communication vehicles related to post-threat remediation
    Generate incident reports and interpret the information to determine the direction of the escalation
    Describe the different types of available metrics and channel to appropriate personnel
    Process incident handling communications and provide context awareness for stakeholders
    Articulate details of problems to remediating teams (constituent-based groups)
    Maintain awareness regarding vulnerabilities and the recommended critical security patches as a result from incident handling
    Communicate recurring issues based on incident handling and provide recommendations for architectural changes or modifications and articulate
    Describe the post-mortem process