Exam: Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) (300-220)
- Price: eur335.00
- Code: 300-220
Jump to:
Description
Top
To earn your CyberOps Professional certification you must pass the 350-201 CBRCOR exam and an eligible concentration exam of your choice, such as 300-220 CBRTHD. Passing the 300-220 CBRTHD exam also earns you the Cisco Certified Specialist – Threat Hunting and Defending certification.
Content
Top1.0 Threat Hunting Fundamentals
- 1.1 Apply the Threat Hunting Maturity Model to an organization's environment, as it relates to the Pyramid of Pain
- 1.2 Describe threats and how to model them with standards such as MITRE ATT&CK, MITRE CAPEC, TaHiTI, and PASTA
- 1.3 Describe the limiting factors of detection tools for malware behavior, propagation, and detection
- 1.4 Describe the advantages and disadvantages of automation (such as artificial intelligence and machine learning) in the operation of a SOC
- 1.5 Determine differences in tactics, techniques, and procedures of an advanced persistent threat and threat actor using logs
- 1.6 Interpret a threat intelligence report and draw conclusions about a threat actor (known advanced persistent threat/commodity human-driven/commodity machine-driven)
- 1.6.a tactics
- 1.6.b techniques
- 1.6.c procedures
2.0 Threat Modeling Techniques
- 2.1 Select the threat modeling approach for a given scenario
- 2.2 Use MITRE ATT&CK to model threats (tactics, techniques, and procedures or changes in tactics, techniques, and procedures)
- 2.3 Describe the uses of structured and unstructured threat hunting
- 2.4 Determine the priority level of attacks based on the Cyber Kill Chain and MITRE ATT&CK
- 2.5 Determine the priority level of attacks based on the MITRE CAPEC model
- 2.6 Perform threat intelligence handling: gathering, cataloging, utilizing, and removing
3.0 Threat Actor Attribution Techniques
- 3.1 Determine attack tactics, techniques, and procedures using logs
- 3.2 Interpret tactics, techniques and procedures of a given threat actor
- 3.3 Select the delivery method, payload, tactic, or timeline that indicates an authorized assessment or an attack (threat actor or penetration tester)
- 3.4 Determine usable artifacts for detection of advanced persistent threat actors at all levels of the Pyramid of Pain
- 3.4.a tactics
- 3.4.b techniques
- 3.4.c procedures
4.0 Threat Hunting Techniques
- 4.1 Use scripting languages (such as Python and PowerShell) to augment detection or analytics
- 4.2 Perform a cloud-native threat hunt
- 4.3 Determine undetected threats using endpoint artifacts
- 4.4 Determine the C2C communications to and from infected hosts using endpoint applications, processes, and logs
- 4.5 Select suspicious activity using session and protocol data
- 4.6 Determine the stage of infection within C2 communications using traffic data
- 4.7 Select weakness in code using code-level analysis tools (such as PE Checker, BURP Suite, and SEM Grep)
- 4.8 Describe the analysis process for applications and operating systems used by IoT devices
- 4.9 Describe memory-resident attacks and how to perform analysis using memory-specific tools (such as Volatility)
- 4.10 Construct a signature for detection or analysis
- 4.11 Recognize the likelihood of attack by an attack vector within a given environment
5.0 Threat Hunting Processes
- 5.1 Describe the process to identify memory-resident attacks
- 5.2 Determine compromises by reverse engineering
- 5.3 Determine known and unknown gaps in detection
- 5.3.a vulnerabilities
- 5.3.b configuration errors
- 5.3.c threats
- 5.4 Interpret data from memory-specific tools
- 5.5 Construct a runbook or playbook to address a detectable scenario
- 5.6 Recommend tools, configurations, detection, and deception techniques for a given scenario
- 5.7 Recommend attack remediation strategies based on the results of a threat assessment
- 5.8 Recommend changes to improve the effectiveness and efficiency of a threat hunt
- 5.9 Recommend security countermeasures and mitigations for identified risks
6.0 Threat Hunting Outcomes
- 6.1 Describe how multiproduct integration enhances data visibility within a product and accelerates analysis
- 6.2 Diagnose analytical gaps using threat hunting methodologies
- 6.3 Recommend a mitigation strategy to block C2 traffic
- 6.4 Recommend changes in hunt capability to advance to the next Threat Hunting Maturity Model phase
- 6.5 Recommend changes to a detection methodology to augment analytical and process gaps
- 6.6 Use presentation resources to convey findings and direct environmental change
The above topics are likely to be included on the 300-220 exam. The topics are subject to change at any time to reflect the latest technologies aligned to Cisco's products.
Practical skills in the exam
Cisco's performance-based testing gives you an experience that best replicates a true lab enviroment. As a result, the number of questions on your exam may vary.