• The Open University

Cyber Security Operations (Cisco)

Develop skills, knowledge and understanding focused on how cyber security professionals respond to a cyberattack.

Cyber Security Operations (Cisco)
  • Duration12 weeks
  • Weekly study13 hours
This course is part of the Cyber Security Operations (Cisco) program, which will enable you to develop professional skills to respond to and prevent cyberattacks and crimes.

Cyber Security

Cyber security is a rapidly changing world and equally evolving discipline. What you knew a couple of years ago has most likely already changed and will continue to migrate over time. We are all challenged by the complexity of the cyberthreats out there as well as the different technologies under attack. The internet of things, email, websites and online businesses are all being threatened. Alongside defence, corporations, health-care and financial services. Partnering with Cisco, this course will equip you to understand the world of cybersecurity and the threats that face modern technology.

Syllabus

  • Week 1

    Introduction to CyberOps

    • Welcome to the course

      In this activity, you will be finding your way around the course. You'll get to know FutureLearn and Cisco's NetAcad platform. You will also meet your fellow learners and get started with your learning.

    • Introduction to NetAcad

      In this activity, you will be introduced to the Cisco NetAcad learning space.

    • What are the challenges?

      In this activity, you will explore the big challenges related to cyber security operations from an industry perspective. You will also reflect on the skills needed to become a cyber security professional.

    • The threat in reality

      In this activity, you will learn about the current cyber threat landscape and how different organisations dealt with cyber incidents. You will also read and respond to a cyber incident scenario.

    • Week 1 Review

      Well done for completing Week 1! In this activity, you will find out how to take your learning further with Cisco certification. You can also post your questions in the help area to get support from the course mentors.

  • Week 2

    The art of warfare

    • Security operations and Windows

      In this activity, you will find out the key topics and the learning outcomes for this week.

    • Modules 1–2: Threat Actors and Defenders

      In this activity, you will complete the reading and learning activities in Modules 1–2: Threat Actors and Defenders, on NetAcad.

    • Week 2 Review

      In this activity, you will reflect on your learning, catch up on your study and prepare for next week.

  • Week 3

    The differences between Operating Systems and Security Onion

    • Linux and networking protocols and services

      In this activity, you will find out the key topics and the learning outcomes for this week.

    • Modules 3–4: Operating System Overview

      In this activity, you will explore the Windows and Linux Operating System and read Modules 3 and 4 on NetAcad.

    • Week 3 Review

      In this activity, you will recap your learning from this week and briefly look at your assessment task.

  • Week 4

    You don’t fight a battle on just one front

    • Network infrastructure and security

      In this activity, you will find out the key topics and the learning outcomes for this week.

    • Modules 5–10: Network Fundamentals

      In this activity, you will read and complete the activities in Modules 5–10: Network Fundamentals.

    • Week 4 Review

      In this activity, you will reflect on your learning so far and catch up with any unfinished study on the NetAcad learning platform.

  • Week 5

    Gathering data: maybe this is the art of war?

    • Protecting the network from attacks

      In this activity, you will find out the key topics and the learning outcomes for this week.

    • Modules 11–12: Network Communication Devices and Network Security Infrastructure

      The focus of this week is to explore in greater depth the discipline of network monitoring.

    • Week 5 Review

      In this activity, you will reflect on your learning so far and catch up with any unfinished study on the NetAcad learning platform.

  • Week 6

    Cryptography and decryption

    • Decrypting the cryptograph

      In this activity, you will find out the key topics and the learning outcomes for this week.

    • Modules 13–17: Threats and Attacks

      These modules focus on data confidentiality, data integrity, origin authentication, and non-repudiation. All of these will be explored in more detail this week.

    • Week 6 Review

      In this activity, you will reflect on your learning so far and catch up with any unfinished study on the NetAcad learning platform.

  • Week 7

    Monitoring the attacker

    • Analysis and monitoring

      In this activity, you will find out the key topics and the learning outcomes for this week.

    • Modules 18–23 (2 sprints to complete)

      In this activity, you will read and complete all the activities in two sprints; Modules 18–23: Network Defense, Cryptography and Endpoint Protection, on NetAcad.

    • Week 7 Review

      In this activity, you will reflect on your learning so far and catch up with any unfinished study on the NetAcad learning platform.

  • Week 8

    Responding to an incident

    • Incident response

      In this activity, you will find out the key topics and the learning outcomes for this week.

    • Modules 24–28 (2 sprints to complete)

      In this activity, you will read and complete all the activities in; Modules 24–25: Protocols and Log Files, and Modules 26–28: Analysing Security Data.

    • Week 8 Review

      In this activity, you will reflect on your learning so far and catch up with any unfinished study on the NetAcad learning platform.

  • Week 9

    Reflecting on your learning so far

    • Time to catch up

      In this activity, you will find out what to expect this week, and how to begin your review and assessment preparation.

    • Looking back: the Cisco course exams!

      In this activity, we explain how to calculate your Cisco course exam result.

    • Looking forward: the practical question

      In this activity, you will be working on a practical challenge, completing a forensically defensible investigation, and assessing and analysing evidence. You will also present a technically accurate analysis of the attack.

    • Looking forward: the academic question

      In this activity, you will focus on finding resources and researching ideas. You will discover how to use best practices in an academic setting to back up your ideas when you are working towards your assessment submission.

    • Week 9 Review

      In this activity, you will bring your learning together and reflect on what you have learned so far. You will learn about academic referencing and review your assessment questions.

  • Week 10

    The CyberOps assessment

    • Welcome to your assessment

      In this activity, we will introduce you to the assessment structure and explain how the assessment questions align with the microcredential learning outcomes.

    • Assessment questions

      In this activity, we will introduce the assessment structure in four parts. Each question part will be explained with a percentage weighting towards your final mark.

    • Submitting your assessment

      In this activity, we will explain how to submit your assessment, and remind you of the deadlines and some essential tasks that you must complete before you submit your assessment.

  • Week 11

    Preparing your assessment

    • Preparing your assessment

      In this activity, we will focus is on preparing your submission for your assessment.

  • Week 12

    Submitting your assessment

    • Submitting your assessment

      In this activity, you will finalise and submit your assessment.

What will you achieve?

By the end of the course, you‘ll be able to...

  • Evaluate current, commonplace threats in the context of a cybersecurity investigation
  • Evaluate how different security and cryptographic techniques affect a cybersecurity incursion
  • Investigate evidence from a cyber security incursion
  • Apply legally defensible practices to a cyber security investigation
  • Explain the purpose of different cybersecurity technologies

Who is the course for?

This course is intended for learners who already have a grounding in computer technology looking to upskill into working with cybersecurity, or those who already work in the sector looking to update their knowledge to current standards.

Who will you learn with?

Enthusiastic about teaching network engineering and cybersecurity - been doing it for a very long time. Also: iconoclast, user of social media for pedagogy, herder of geeks, nerds and anoracks.

Who developed the course?

The Open University

The Open University (OU) is the largest academic institution in the UK and a world leader in flexible distance learning, with a mission to be open to people, places, methods and ideas.

  • Established1969
  • LocationMilton Keynes, UK
  • World rankingTop 510Source: Times Higher Education World University Rankings 2020