Course Description
The Cisco CyberOps Associate program prepares students for critical roles in security operations, focusing on incident response and threat monitoring.
About the Academic Partner
Systems, Inc. is a leading multinational technology company specializing in networking and cybersecurity solutions. Known for its routers, switches, firewalls, and cloud services, Cisco supports businesses of all sizes with scalable, secure, and innovative technologies. Operating in over 100 countries, it has played a key role in global connectivity. Its strong ecosystem, continuous innovation, and industry-recognized certifications make Cisco a top choice for IT professionals and organizations worldwide.
Eligibility Requirements
Experience
1–2 years with AWS/Azure or IT security.
2–5 years in IT or networking, with 3–4 years in cybersecurity for advanced roles.
Core Knowledge
Cloud computing fundamentals (AWS, Azure).
Cybersecurity basics (ethical hacking, penetration testing, security ops).
Strong grasp of network infrastructure and security protocols.
Skills
Basic networking (TCP/IP, routing, firewalls).
Security operations (incident response, risk management, compliance).
Network security, IAM, encryption, and access control.
Certifications (Recommended)
CompTIA Network+, Security+, Cloud+.
AWS Solutions Architect – Associate, Azure Administrator Associate.
IT Background
Solid foundation in IT operations, networking, virtualization, and system admin.
Experience managing and securing multi-cloud environments.
Modules/Program Outline
1. The Danger
2. Fighters in the War Against Cybercrime
3. The Windows Operating System
4. Linux Overview
5. Network Protocols
6. Ethernet and Internet Protocol (IP)
7. Principles of Network Security Connectivity Verification
8. Address Resolution Protocol
9. The Transport Layer
10. Network Services
11. Network Communication Devices
12. Network Security Infrastructure
13. Attackers and Their Tools
14. Common Threats and Attacks
15. Observing Network Operation
16. Attacking the Foundation
17. Attacking What We Do
18. Understanding Defense
19. Access Control
20. Threat Intelligence
21. Cryptography
22. Endpoint Protection
23. Endpoint Vulnerability Assessment
24. Technologies and Protocols
25. Network Security Data
26. Evaluating Alerts
27. Working with Network Security Data
28. Digital Forensics and Incident Analysis and Response
Inclusions
Learning Platform, Gamified Labs, Learning Materials, Modules
Batch: January 2026
Batch: June 2026
Program Faculty


