Pack IT Forwarding

Pack IT Forwarding

Paying it forward by sharing knowledge

Menu
  • Home
  • Certification
    • Cisco CyberOps Associate
    • CySA+
  • About
    • Guest Appearances

Tag: CCNA CyberOps

Cisco Certification the Next Generation

1 Comment
| Certification, cisco
Photo by Alexas Fotos from Pexels

If you’ve been paying attention to the Cisco world since Cisco Live US 2019, you have probably heard a lot about the changes to the Cisco Certification program. The changes are now the rule of the land and we’re starting to get a better picture of how things will work going forward. You Get a […]

Read More »

CCNA CyberOps SECOPS – Objective 5.4

No Comments
| Blog, CCNA CyberOps, Certification, cisco
Photo by kat wilcox from Pexels

Describe these concepts as they are documented in NIST SP800-86: evidence collection order, data integrity, data preservation, volatile data collection Implementing Cisco Cybersecurity Operations (210-255) The best way to study for this objective is to read or at least read the highlights of the NIST document. Here are some of my notes. Evidence Collection Order […]

Read More »

CCNA CyberOps SECOPS – Objective 5.3

No Comments
| Blog, CCNA CyberOps, Certification, cisco
Photo by rawpixel.com from Pexels

Define these activities as they relate to incident handling Implementing Cisco Cybersecurity Operations (210-255) Identification Continuous monitoring of the environment by the SOC allows for identification of true positive incidents. This monitoring can come from multiple sources including IPS/IDS, Firewalls, Endpoint Agents and the SIEM. Once detected and confirmed the incident is sent to the […]

Read More »

CCNA CyberOps SECOPS – Objective 5.2

No Comments
| Blog, CCNA CyberOps, Certification, cisco
Whiteboard drawing of a flow chart.

Apply the NIST.SP800-61 r2 incident handling process to an event Implementing Cisco Cybersecurity Operations (210-255) The NIST.SP800-61 r2 incident handling process document contains several example scenarios. These are all contained in Appendix A of the document. Below are some of the suggested questions for each phase from section A-1 of the document. Preparation: Would the […]

Read More »

Posts pagination

1 2 … 15 Next

Follow Me

  • X
  • LinkedIn
  • Facebook
  • Email
  • RSS Feed
Ben Story @ntwrk80

Ben Story @ntwrk80

Ben Story is a network security engineer for a solution provider. He has been working with networking since 1998, his Freshman year at Truman State University, when he worked for a small dial-up ISP managing their Shiva LanRover modem bank. His random bits and bytes can be found on his blog at https://packitforwarding.com or on Twitter @ntwrk80.

Verified Services

View Full Profile →

Recent Posts

  • HPE Tech Jam 2025
  • Standards, Who Needs Standards!
  • Captive Portals and Not So Captive Portals
  • AI RRM It’s What’s On the Air
  • PCNSA 3.6

Archives

  • March 2025
  • June 2023
  • February 2023
  • March 2022
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • June 2020
  • April 2020
  • March 2020
  • February 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • August 2011
Cisco IT Blog Awards Winner Most Inspirational
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© Ben Story 2025.

© Pack IT Forwarding 2025. Powered by WordPress

Go to mobile version