200 201 CBROPS v1.1
200 201 CBROPS v1.1
1 (200-201)
Exam Descrip on: Understanding Cisco Cybersecurity Opera ons Fundamentals v1.1 (CBROPS 200-201
is a 120-minute exam that is associated with the Cisco Cer ed CyberOps Associate Cer ca on. This
exam cer es a candidate’s knowledge and skills related to security concepts, security monitoring, host-
based analysis, network intrusion analysis, and security policies and procedures. The course,
Understanding Cisco Cybersecurity Opera ons Fundamentals, helps candidates to prepare for this exam.
The following topics are general guidelines for the content likely to be included on the exam. However,
other related topics may also appear on any speci c delivery of the exam. To be er re ect the contents
of the exam and for clarity purposes, the guidelines below may change at any me without no ce.
8. Iden fy the challenges of data visibility (network, host, and cloud) in detec on
10. Interpret the 5-tuple approach to isolate a compromised host in a grouped set of logs
11. Compare rule-based detec on vs. behavioral and sta s cal detec on
6. Describe web applica on a acks, such as SQL injec on, command injec ons, and cross-
site scrip ng
8. Describe endpoint-based a acks, such as bu er over ows, command and control (C2),
malware, and ransomware
9. Describe evasion and obfusca on techniques, such as tunneling, encryp on, and proxies
10. Describe the impact of cer cates on security (includes PKI, public/private crossing the
network, asymmetric/symmetric)
6. Interpret opera ng system, applica on, or command line logs to iden fy an event
7. Interpret the output report of a malware analysis tool such as a detona on chamber or
sandbox
a. Hashes
b. URLs
c. Systems, events, and networking
3. Compare deep packet inspec on with packet ltering and stateful rewall opera on
5. Compare the characteris cs of data obtained from taps or tra c monitoring and
transac onal data (NetFlow) in the analysis of network tra c
6. Extract les from a TCP stream when given a PCAP le and Wireshark
10. Classify intrusion events into categories as de ned by security models, such as Cyber Kill
Chain Model and Diamond Model of Intrusion
11. Describe the rela onship of SOC metrics to scope analysis ( me to detect, me to
contain, me to respond, me to control)