300-220: Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD)
Cisco 300-220 Exam Overview:
Exam Name | Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps |
Exam Number | 300-220 CBRTHD |
Exam Number | $300 USD |
Duration | 90 minutes |
Number of Questions | 55-65 |
Passing Score | Variable (750-850 / 1000 Approx.) |
Recommended Training | Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) |
Sample Questions | Cisco 300-220 Sample Questions |
Practice Exam | Cisco Certified Specialist Threat Hunting and Defending Practice Test |
Cisco 300-220 Exam Topics:
Section | Weight | Objectives |
Threat Hunting Fundamentals | 20% |
- Apply the Threat Hunting Maturity Model to an organization's environment, as it relates to the Pyramid of Pain ◉ tactics |
Threat Modeling Techniques | 10% | - Select the threat modeling approach for a given scenario - Use MITRE ATT&CK to model threats (tactics, techniques, and procedures or changes in tactics, techniques, and procedures) - Describe the uses of structured and unstructured threat hunting - Determine the priority level of attacks based on the Cyber Kill Chain and MITRE ATT&CK - Determine the priority level of attacks based on the MITRE CAPEC model - Perform threat intelligence handling: gathering, cataloging, utilizing, and removing |
Threat Actor Attribution Techniques | 20% |
- Determine attack tactics, techniques, and procedures using logs ◉ tactics |
Threat Hunting Techniques | 20% | - Use scripting languages (such as Python and PowerShell) to augment detection or analytics - Perform a cloud-native threat hunt - Determine undetected threats using endpoint artifacts - Determine the C2 communications to and from infected hosts using endpoint applications, processes, and logs - Select suspicious activity using session and protocol data - Determine the stage of infection within C2 communications using traffic data - Select weakness in code using code-level analysis tools (such as PE Checker, BURP Suite, and SEM Grep) - Describe the analysis process for applications and operating systems used by IoT devices - Describe memory-resident attacks and how to perform analysis using memory-specific tools (such as Volatility) - Construct a signature for detection or analysis - Recognize the likelihood of attack by an attack vector within a given environment |
Threat Hunting Processes | 20% |
- Describe the process to identify memory-resident attacks ◉ vulnerabilities - Interpret data from memory-specific tools |
Threat Hunting Outcomes | 10% |
- Describe how multiproduct integration enhances data visibility within a product and accelerates analysis |
0 comments:
Post a Comment