• Online, Self-Paced
Course Description

In this course, you'll learn about host-based attacks in their various forms. Next, you'll explore components of Windows 10 and Ubuntu that are useful in host-based analysis. Finally, you'll examine the concept of attribution and its importance when investigating an organizational security breach. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.

Learning Objectives

{"identify the type of attack that involves the hacker using malicious software to call home and control your system","recognize the type of attack that involves a hacker sending more data to an application than what it can handle","recognize the type of attack a hacker uses to encrypt your data and withhold the encryption key"}

Framework Connections