{"id":994917,"date":"2025-01-09T11:19:43","date_gmt":"2025-01-09T08:19:43","guid":{"rendered":"http:\/\/18.199.85.50\/?p=994917"},"modified":"2025-08-18T16:08:18","modified_gmt":"2025-08-18T13:08:18","slug":"performing-cyberops-using-cisco-security-technologies-cbrcor","status":"publish","type":"post","link":"https:\/\/www.morten.com.tr\/en\/performing-cyberops-using-cisco-security-technologies-cbrcor\/","title":{"rendered":"Performing CyberOps Using Cisco Security Technologies (CBRCOR)"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"994917\" class=\"elementor elementor-994917\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c62cda e-flex e-con-boxed e-con e-parent\" data-id=\"5c62cda\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d6a6c0 elementor-widget elementor-widget-text-editor\" data-id=\"5d6a6c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Education<\/strong><\/p><p><strong>Performing CyberOps Using Cisco Security Technologies (CBRCOR)<\/strong> training provides information on the fundamentals, methods and automation techniques of cybersecurity operations. This course is a <strong>Security Operations Center (SOC)<\/strong> in your team <strong>Information Security Analyst<\/strong> helps you prepare for the role. During the training, you will create playbooks that can be used in incident response (IR) processes, provide security automation via cloud platforms and <strong>SecDevOps<\/strong> You will also learn techniques for detecting cyber attacks, analyzing threats, and making appropriate recommendations to improve cybersecurity.<\/p><p><strong>Prerequisites<\/strong><\/p><p>Although there are no mandatory prerequisites, it is recommended that you have the following knowledge and skills:<\/p><ul><li><strong>UNIX\/Linux<\/strong> Familiarity with shells (bash, csh) and shell commands<\/li><li><strong>Splunk<\/strong> familiarity with search and navigation functions<\/li><li>Basic scripting knowledge in Python, JavaScript, PHP or similar language<\/li><\/ul><p>The following courses from Cisco can help you prepare for this training:<\/p><ul><li><strong>Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)<\/strong><\/li><li><strong>Implementing and Administering Cisco Solutions (CCNA)<\/strong><\/li><\/ul><p>\u00dc\u00e7\u00fcnc\u00fc parti kaynaklar:<\/p><ul><li><strong>Splunk Fundamentals 1<\/strong><\/li><li><strong>Blue Team Handbook: Incident Response Edition<\/strong> \u2013 Don Murdoch<\/li><li><strong>Threat Modeling: Designing for Security<\/strong> &#8211; Adam Shostack<\/li><li><strong>Red Team Field Manual<\/strong> &#8211; Ben Clark<\/li><li><strong>Blue Team Field Manual<\/strong> &#8211; Alan J. White<\/li><li><strong>Purple Team Field Manual<\/strong> &#8211; Tim Bryant<\/li><li><strong>Applied Network Security and Monitoring<\/strong> &#8211; Chris Sanders, Jason Smith<\/li><\/ul><p><strong>Duration of Training<\/strong><\/p><p><strong>Toplam S\u00fcre:<\/strong>\u00a05 G\u00fcn (G\u00fcnde 6 saat)<br \/><strong>Toplam E\u011fitim Saati:<\/strong>\u00a030 saat<br \/><strong>E\u011fitim Format\u0131:<\/strong>\u00a0Uygulamal\u0131 ve interaktif y\u00fcz y\u00fcze \/online ortam<\/p><p><strong>Who Should Participate?<\/strong><\/p><p>This training is particularly suitable for those working in the following positions:<\/p><ul><li><strong>Cybersecurity engineers<\/strong><\/li><li><strong>Cybersecurity researchers<\/strong><\/li><li><strong>Incident managers<\/strong><\/li><li><strong>Incident response teams<\/strong><\/li><li><strong>Network engineers<\/strong><\/li><li>SOC analysts (entry-level professionals with at least 1 year of experience)<\/li><\/ul><p><strong>Educational Content<\/strong><\/p><ol><li>Understanding Risk Management and SOC Operations<\/li><li>Learning About Analytical Processes and Playbooks<\/li><li>Review Packet Captures, Logs and Traffic Analysis<\/li><li>Examining Endpoint and Device Logs<\/li><li>Understanding Security Responsibilities in Cloud Service Models<\/li><li>Understanding Corporate Environmental Assets<\/li><li>Applying Threat Settings<\/li><li>Threat Research and Threat Intelligence Applications<\/li><li>Understanding APIs<\/li><li>Understanding SOC Development and Deployment Models<\/li><li>Security Analytics and Reporting in the SOC<\/li><li>Malware Forensics Basics<\/li><li>Threat Hunting Basics<\/li><li>Conducting Incident Investigation and Response<\/li><\/ol><p><strong>What You Will Gain at the End of Training<\/strong><\/p><p>At the end of the training:<\/p><ul><li>You will be able to implement security analytics and incident response processes in SOC environments.<\/li><li>You will be able to detect and analyze cyber attacks and threats, and provide reporting and improvement suggestions.<\/li><li>You will be able to effectively implement security automation solutions using the SecDevOps methodology.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-5154baa elementor-align-right elementor-widget elementor-widget-button\" data-id=\"5154baa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/wp-content\/uploads\/2025\/01\/Performing-CyberOps-Using-Cisco-Security-Technologies-CBRCOR.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download PDF<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>E\u011fitim Hakk\u0131nda Performing CyberOps Using Cisco Security Technologies (CBRCOR) e\u011fitimi, siber g\u00fcvenlik operasyonlar\u0131n\u0131n temelleri, y\u00f6ntemleri ve otomasyon teknikleri hakk\u0131nda bilgi sa\u011flar. Bu kurs, bir G\u00fcvenlik Operasyonlar\u0131 Merkezi (SOC) ekibinde Bilgi G\u00fcvenli\u011fi Analisti rol\u00fcne haz\u0131rlanman\u0131za yard\u0131mc\u0131 olur. E\u011fitim s\u00fcresince, olay m\u00fcdahale (IR) s\u00fcre\u00e7lerinde kullan\u0131labilecek playbook\u2019lar\u0131 olu\u015fturma, bulut platformlar\u0131 \u00fczerinden g\u00fcvenlik otomasyonu sa\u011flama ve SecDevOps metodolojisini \u00f6\u011frenirsiniz&#8230;.<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[116,104,189],"tags":[],"class_list":["post-994917","post","type-post","status-publish","format-standard","hentry","category-cisco","category-egitimler","category-cisco-teknoloji-egitimleri"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Performing CyberOps Using Cisco Security Technologies (CBRCOR) - Morten<\/title>\n<meta name=\"description\" content=\"Performing CyberOps Using Cisco Security Technologies (CBRCOR) - Morten\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Performing CyberOps Using Cisco Security Technologies (CBRCOR)\" \/>\n<meta property=\"og:description\" content=\"Performing CyberOps Using Cisco Security Technologies (CBRCOR) - Morten\" \/>\n<meta property=\"og:url\" content=\"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/\" \/>\n<meta property=\"og:site_name\" content=\"Morten\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BTEgitimMorten\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-09T08:19:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-18T13:08:18+00:00\" \/>\n<meta name=\"author\" content=\"dvususer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dvususer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/\"},\"author\":{\"name\":\"dvususer\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820\"},\"headline\":\"Performing CyberOps Using Cisco Security Technologies (CBRCOR)\",\"datePublished\":\"2025-01-09T08:19:43+00:00\",\"dateModified\":\"2025-08-18T13:08:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/\"},\"wordCount\":494,\"publisher\":{\"@id\":\"https:\/\/www.morten.com.tr\/#organization\"},\"articleSection\":[\"Cisco\",\"E\u011fitimler\",\"TEKNOLOJI E\u011eITIMLERI\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/\",\"url\":\"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/\",\"name\":\"Performing CyberOps Using Cisco Security Technologies (CBRCOR) - Morten\",\"isPartOf\":{\"@id\":\"https:\/\/www.morten.com.tr\/#website\"},\"datePublished\":\"2025-01-09T08:19:43+00:00\",\"dateModified\":\"2025-08-18T13:08:18+00:00\",\"description\":\"Performing CyberOps Using Cisco Security Technologies (CBRCOR) - Morten\",\"breadcrumb\":{\"@id\":\"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.morten.com.tr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Performing CyberOps Using Cisco Security Technologies (CBRCOR)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.morten.com.tr\/#website\",\"url\":\"https:\/\/www.morten.com.tr\/\",\"name\":\"Morten\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.morten.com.tr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.morten.com.tr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.morten.com.tr\/#organization\",\"name\":\"Morten Bilgi ve \u0130leti\u015fim Hizmetleri A.\u015e.\",\"alternateName\":\"Morten\",\"url\":\"https:\/\/www.morten.com.tr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp\",\"contentUrl\":\"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp\",\"width\":265,\"height\":116,\"caption\":\"Morten Bilgi ve \u0130leti\u015fim Hizmetleri A.\u015e.\"},\"image\":{\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/BTEgitimMorten\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820\",\"name\":\"dvususer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g\",\"caption\":\"dvususer\"},\"sameAs\":[\"https:\/\/www.morten.com.tr\"],\"url\":\"https:\/\/www.morten.com.tr\/en\/author\/dvususer\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Performing CyberOps Using Cisco Security Technologies (CBRCOR) - Morten","description":"Performing CyberOps Using Cisco Security Technologies (CBRCOR) - Morten","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/","og_locale":"en_US","og_type":"article","og_title":"Performing CyberOps Using Cisco Security Technologies (CBRCOR)","og_description":"Performing CyberOps Using Cisco Security Technologies (CBRCOR) - Morten","og_url":"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/","og_site_name":"Morten","article_publisher":"https:\/\/www.facebook.com\/BTEgitimMorten","article_published_time":"2025-01-09T08:19:43+00:00","article_modified_time":"2025-08-18T13:08:18+00:00","author":"dvususer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dvususer","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/#article","isPartOf":{"@id":"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/"},"author":{"name":"dvususer","@id":"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820"},"headline":"Performing CyberOps Using Cisco Security Technologies (CBRCOR)","datePublished":"2025-01-09T08:19:43+00:00","dateModified":"2025-08-18T13:08:18+00:00","mainEntityOfPage":{"@id":"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/"},"wordCount":494,"publisher":{"@id":"https:\/\/www.morten.com.tr\/#organization"},"articleSection":["Cisco","E\u011fitimler","TEKNOLOJI E\u011eITIMLERI"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/","url":"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/","name":"Performing CyberOps Using Cisco Security Technologies (CBRCOR) - Morten","isPartOf":{"@id":"https:\/\/www.morten.com.tr\/#website"},"datePublished":"2025-01-09T08:19:43+00:00","dateModified":"2025-08-18T13:08:18+00:00","description":"Performing CyberOps Using Cisco Security Technologies (CBRCOR) - Morten","breadcrumb":{"@id":"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/morten.com.tr\/performing-cyberops-using-cisco-security-technologies-cbrcor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.morten.com.tr\/"},{"@type":"ListItem","position":2,"name":"Performing CyberOps Using Cisco Security Technologies (CBRCOR)"}]},{"@type":"WebSite","@id":"https:\/\/www.morten.com.tr\/#website","url":"https:\/\/www.morten.com.tr\/","name":"Morten","description":"","publisher":{"@id":"https:\/\/www.morten.com.tr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.morten.com.tr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.morten.com.tr\/#organization","name":"Morten Information and Communication Services Inc.","alternateName":"Morten","url":"https:\/\/www.morten.com.tr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/","url":"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp","contentUrl":"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp","width":265,"height":116,"caption":"Morten Bilgi ve \u0130leti\u015fim Hizmetleri A.\u015e."},"image":{"@id":"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BTEgitimMorten"]},{"@type":"Person","@id":"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820","name":"dvususer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.morten.com.tr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g","caption":"dvususer"},"sameAs":["https:\/\/www.morten.com.tr"],"url":"https:\/\/www.morten.com.tr\/en\/author\/dvususer\/"}]}},"_links":{"self":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts\/994917"}],"collection":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/comments?post=994917"}],"version-history":[{"count":16,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts\/994917\/revisions"}],"predecessor-version":[{"id":997025,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts\/994917\/revisions\/997025"}],"wp:attachment":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/media?parent=994917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/categories?post=994917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/tags?post=994917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}