{"id":994995,"date":"2025-01-09T14:53:59","date_gmt":"2025-01-09T11:53:59","guid":{"rendered":"http:\/\/18.199.85.50\/?p=994995"},"modified":"2025-08-18T15:46:02","modified_gmt":"2025-08-18T12:46:02","slug":"implementing-cisco-cybersecurity-operations-secops","status":"publish","type":"post","link":"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/","title":{"rendered":"Implementing Cisco Cybersecurity Operations (SECOPS)"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"994995\" class=\"elementor elementor-994995\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c62cda e-flex e-con-boxed e-con e-parent\" data-id=\"5c62cda\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d6a6c0 elementor-widget elementor-widget-text-editor\" data-id=\"5d6a6c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Education<\/strong><\/p><p>The \u201cImplementing Cisco Cybersecurity Operations (SECOPS)\u201d v1.0 course provides you with a foundational understanding of security incident analysis techniques used in a Security Operations Center (SOC). You will learn to identify threats and malicious activities, correlate incidents, perform security reviews, use incident scenarios, and learn SOC operations and procedures. This is the second of two courses that prepare you for the Cisco\u00ae CCNA\u00ae Cyber \u200b\u200bOps certification. This certification validates your knowledge and hands-on skills to help you address cybersecurity incidents as a mid-level member of a SOC team.<\/p><p>Today's cyber security professionals need to detect, investigate and respond to a wide range of security incidents. This course will help you gain the skills needed to play a role in detecting and responding to security incidents in your organisation's SOC.<\/p><p><strong>Prerequisites<\/strong><\/p><ul><li>Basic network knowledge<\/li><li>Familiarity with basic cybersecurity concepts<\/li><li>Completion of \u2018Introduction to Cybersecurity\u2019 or a similar entry-level cyber security course<\/li><\/ul><p><strong>Duration of Training<\/strong><\/p><p><strong>Toplam S\u00fcre:<\/strong>\u00a05 G\u00fcn (G\u00fcnde 6 saat)<br \/><strong>Toplam E\u011fitim Saati:<\/strong>\u00a030 saat<br \/><strong>E\u011fitim Format\u0131:<\/strong>\u00a0Uygulamal\u0131 ve interaktif y\u00fcz y\u00fcze \/online ortam<\/p><p><strong>Who Should Participate?<\/strong><\/p><ul><li>IT Professionals<\/li><li>All students looking to enter mid-level cybersecurity roles such as:<ul><li>SOC cybersecurity analysts<\/li><li>Computer or network defense analysts<\/li><li>Computer network defense infrastructure support personnel<\/li><li>Future incident response teams and SOC personnel<\/li><li>Cisco integrators or partners<\/li><\/ul><\/li><\/ul><p><strong>Educational Content<\/strong><\/p><ul><li><strong>SOC Overview<\/strong><ul><li>Defining the Security Operations Center<\/li><li>Understanding NSM Tools and Data<\/li><li>Understanding Incident Analysis in a Threat-Focused SOC<\/li><li>Identifying Resources to Hunt Cyber \u200b\u200bThreats<\/li><\/ul><\/li><li><strong>Security Incident Investigations<\/strong><ul><li>Understanding Event Correlation and Normalization<\/li><li>Identifying Common Attack Vectors<\/li><li>Identifying Harmful Activities<\/li><li>Identifying Suspicious Behavior Patterns<\/li><li>Conducting Security Incident Investigations<\/li><\/ul><\/li><li><strong>SOC Operations<\/strong><ul><li>Explaining the SOC Scenario<\/li><li>Understanding SOC Metrics<\/li><li>Understanding SOC WMS and Automation<\/li><li>Explaining the Incident Response Plan<\/li><li>Appendix A \u2013 Describing the Computer Security Incident Response Team<\/li><li>Appendix B \u2013 Understanding the use of VERIS<\/li><\/ul><\/li><\/ul><p><strong>What You Will Gain at the End of Training<\/strong><\/p><ul><li>Explain the three common types of SOCs, the tools used by SOC analysts, job roles within a SOC, and incident analysis within a threat-focused SOC.<\/li><li>Explain security incident investigations, including event correlation and normalization, and common attack vectors to identify malicious and suspicious activities.<\/li><li>Explain the use of a SOC scenario to assist in investigations, the use of metrics to measure SOC effectiveness, the use of a SOC workflow management system and automation to increase SOC efficiency, and the concepts of an incident response plan.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-5154baa elementor-align-right elementor-widget elementor-widget-button\" data-id=\"5154baa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/wp-content\/uploads\/2025\/01\/Implementing-Cisco-Cybersecurity-Operations-SECOPS.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download PDF<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>E\u011fitim Hakk\u0131nda &#8220;Implementing Cisco Cybersecurity Operations (SECOPS)&#8221; v1.0 kursu, size bir G\u00fcvenlik Operasyon Merkezi&#8217;nde (SOC) kullan\u0131lan g\u00fcvenlik olay\u0131 analizi teknikleri hakk\u0131nda temel d\u00fczeyde bilgi sa\u011flar. Tehditleri ve zararl\u0131 faaliyetleri tan\u0131mlamay\u0131, olaylar\u0131 ili\u015fkilendirmeyi, g\u00fcvenlik incelemeleri ger\u00e7ekle\u015ftirmeyi, olay senaryolar\u0131n\u0131 kullanmay\u0131 ve SOC operasyonlar\u0131 ile prosed\u00fcrlerini \u00f6\u011frenmeyi \u00f6\u011freneceksiniz. Bu, sizi Cisco\u00ae CCNA\u00ae Cyber Ops sertifikas\u0131 i\u00e7in haz\u0131rlayan iki&#8230;<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[116,104,189],"tags":[],"class_list":["post-994995","post","type-post","status-publish","format-standard","hentry","category-cisco","category-egitimler","category-cisco-teknoloji-egitimleri"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Implementing Cisco Cybersecurity Operations (SECOPS) - Morten<\/title>\n<meta name=\"description\" content=\"Implementing Cisco Cybersecurity Operations (SECOPS) - Morten\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Implementing Cisco Cybersecurity Operations (SECOPS)\" \/>\n<meta property=\"og:description\" content=\"Implementing Cisco Cybersecurity Operations (SECOPS) - Morten\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/\" \/>\n<meta property=\"og:site_name\" content=\"Morten\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BTEgitimMorten\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-09T11:53:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-18T12:46:02+00:00\" \/>\n<meta name=\"author\" content=\"dvususer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dvususer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/\"},\"author\":{\"name\":\"dvususer\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820\"},\"headline\":\"Implementing Cisco Cybersecurity Operations (SECOPS)\",\"datePublished\":\"2025-01-09T11:53:59+00:00\",\"dateModified\":\"2025-08-18T12:46:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/\"},\"wordCount\":500,\"publisher\":{\"@id\":\"https:\/\/www.morten.com.tr\/#organization\"},\"articleSection\":[\"Cisco\",\"E\u011fitimler\",\"TEKNOLOJI E\u011eITIMLERI\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/\",\"url\":\"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/\",\"name\":\"Implementing Cisco Cybersecurity Operations (SECOPS) - Morten\",\"isPartOf\":{\"@id\":\"https:\/\/www.morten.com.tr\/#website\"},\"datePublished\":\"2025-01-09T11:53:59+00:00\",\"dateModified\":\"2025-08-18T12:46:02+00:00\",\"description\":\"Implementing Cisco Cybersecurity Operations (SECOPS) - Morten\",\"breadcrumb\":{\"@id\":\"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.morten.com.tr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Implementing Cisco Cybersecurity Operations (SECOPS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.morten.com.tr\/#website\",\"url\":\"https:\/\/www.morten.com.tr\/\",\"name\":\"Morten\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.morten.com.tr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.morten.com.tr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.morten.com.tr\/#organization\",\"name\":\"Morten Bilgi ve \u0130leti\u015fim Hizmetleri A.\u015e.\",\"alternateName\":\"Morten\",\"url\":\"https:\/\/www.morten.com.tr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp\",\"contentUrl\":\"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp\",\"width\":265,\"height\":116,\"caption\":\"Morten Bilgi ve \u0130leti\u015fim Hizmetleri A.\u015e.\"},\"image\":{\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/BTEgitimMorten\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820\",\"name\":\"dvususer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.morten.com.tr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g\",\"caption\":\"dvususer\"},\"sameAs\":[\"https:\/\/www.morten.com.tr\"],\"url\":\"https:\/\/www.morten.com.tr\/en\/author\/dvususer\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Implementing Cisco Cybersecurity Operations (SECOPS) - Morten","description":"Implementing Cisco Cybersecurity Operations (SECOPS) - Morten","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/","og_locale":"en_US","og_type":"article","og_title":"Implementing Cisco Cybersecurity Operations (SECOPS)","og_description":"Implementing Cisco Cybersecurity Operations (SECOPS) - Morten","og_url":"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/","og_site_name":"Morten","article_publisher":"https:\/\/www.facebook.com\/BTEgitimMorten","article_published_time":"2025-01-09T11:53:59+00:00","article_modified_time":"2025-08-18T12:46:02+00:00","author":"dvususer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dvususer","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/#article","isPartOf":{"@id":"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/"},"author":{"name":"dvususer","@id":"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820"},"headline":"Implementing Cisco Cybersecurity Operations (SECOPS)","datePublished":"2025-01-09T11:53:59+00:00","dateModified":"2025-08-18T12:46:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/"},"wordCount":500,"publisher":{"@id":"https:\/\/www.morten.com.tr\/#organization"},"articleSection":["Cisco","E\u011fitimler","TEKNOLOJI E\u011eITIMLERI"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/","url":"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/","name":"Implementing Cisco Cybersecurity Operations (SECOPS) - Morten","isPartOf":{"@id":"https:\/\/www.morten.com.tr\/#website"},"datePublished":"2025-01-09T11:53:59+00:00","dateModified":"2025-08-18T12:46:02+00:00","description":"Implementing Cisco Cybersecurity Operations (SECOPS) - Morten","breadcrumb":{"@id":"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.morten.com.tr\/en\/implementing-cisco-cybersecurity-operations-secops\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.morten.com.tr\/"},{"@type":"ListItem","position":2,"name":"Implementing Cisco Cybersecurity Operations (SECOPS)"}]},{"@type":"WebSite","@id":"https:\/\/www.morten.com.tr\/#website","url":"https:\/\/www.morten.com.tr\/","name":"Morten","description":"","publisher":{"@id":"https:\/\/www.morten.com.tr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.morten.com.tr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.morten.com.tr\/#organization","name":"Morten Information and Communication Services Inc.","alternateName":"Morten","url":"https:\/\/www.morten.com.tr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/","url":"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp","contentUrl":"https:\/\/www.morten.com.tr\/wp-content\/uploads\/2024\/11\/mortenbt.webp","width":265,"height":116,"caption":"Morten Bilgi ve \u0130leti\u015fim Hizmetleri A.\u015e."},"image":{"@id":"https:\/\/www.morten.com.tr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BTEgitimMorten"]},{"@type":"Person","@id":"https:\/\/www.morten.com.tr\/#\/schema\/person\/91a44ec134dd4d2bda435ff6c6975820","name":"dvususer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.morten.com.tr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ddb6fbf1df37151ad4ff2c3518920a29?s=96&d=mm&r=g","caption":"dvususer"},"sameAs":["https:\/\/www.morten.com.tr"],"url":"https:\/\/www.morten.com.tr\/en\/author\/dvususer\/"}]}},"_links":{"self":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts\/994995"}],"collection":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/comments?post=994995"}],"version-history":[{"count":6,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts\/994995\/revisions"}],"predecessor-version":[{"id":997007,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/posts\/994995\/revisions\/997007"}],"wp:attachment":[{"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/media?parent=994995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/categories?post=994995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.morten.com.tr\/en\/wp-json\/wp\/v2\/tags?post=994995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}