|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_on1256686369 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
210510s2021 enk fo 000 0 eng d |
040 |
|
|
|a UKAHL
|b eng
|e rda
|e pn
|c UKAHL
|d UKMGB
|d OCLCO
|d OCLCF
|d N$T
|d EBLCP
|d N$T
|d OCLCO
|d OCLCQ
|d IEEEE
|
015 |
|
|
|a GBC174114
|2 bnb
|
016 |
7 |
|
|a 020189218
|2 Uk
|
020 |
|
|
|a 1800563485
|
020 |
|
|
|a 9781800563483
|q (electronic bk.)
|
020 |
|
|
|z 9781800560871 (pbk.)
|
029 |
1 |
|
|a UKMGB
|b 020189218
|
029 |
1 |
|
|a AU@
|b 000069351167
|
035 |
|
|
|a (OCoLC)1256686369
|
037 |
|
|
|a 9781800563483
|b Packt Publishing Pvt. Ltd
|
037 |
|
|
|a 10163155
|b IEEE
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Singh, Glen D.,
|e author.
|
245 |
1 |
0 |
|a Cisco Certified CyberOps Associate 200-201 certification guide :
|b learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents /
|c Glen D. Singh.
|
264 |
|
1 |
|a Birmingham :
|b Packt Publishing,
|c 2021.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Section 1: Network and Security Concepts -- Chapter 1: Exploring Networking Concepts -- Technical requirements -- The functions of the network layers -- The OSI reference model -- The TCP/IP protocol suite -- Understanding the purpose of various network protocols -- Transmission Control Protocol -- User Datagram Protocol -- Internet Protocol -- The Internet Control Message Protocol -- Lab -- inspecting ICMP messages with Wireshark -- Summary -- Questions -- Further reading
|
505 |
8 |
|
|a Chapter 2: Exploring Network Components and Security Systems -- Technical requirements -- Exploring various network services -- Address Resolution Protocol -- Domain Name System -- Dynamic Host Configuration Protocol -- Discovering the role and operations of network devices -- Hubs -- Switches -- Layer 3 switches -- Routers -- Wireless Access Point (WAP) -- Wireless LAN Controller (WLC) -- Describing the functions of Cisco network security systems -- Firewall -- Cisco Intrusion Prevention System (IPS) -- Web Security Appliance -- Email Security Appliance -- Cisco Advanced Malware Protection
|
505 |
8 |
|
|a Role-based access control -- Authentication, authorization, and accounting -- Understanding security deployment -- Summary -- Questions -- Section 2: Principles of Security Monitoring -- Chapter 4: Understanding Security Principles -- Technical requirements -- Understanding a security operation center -- Types of SOC -- Elements of an SOC -- Understanding the security tools used to inspect data types on a network -- Attack surface and vulnerability -- tcpdump -- NetFlow -- Application visibility and control -- Web content filtering -- Email content filtering
|
505 |
8 |
|
|a Understanding the impact of data visibility through networking technologies -- Access control lists -- NAT and PAT -- Tunneling, encapsulation, and encryption -- Peer-to-Peer (P2P) and TOR -- Load balancing -- Next-gen IPS event types -- Understanding how threat actors transport malicious code -- The domain name system -- The Network Time Protocol -- Web-based traffic -- Email-based traffic -- Delving into data types used during security monitoring -- Session data -- Transaction data -- Full packet capture -- Statistical data -- Extracted content (metadata) -- Alert data -- Summary -- Questions
|
520 |
|
|
|a Questions -- Further reading -- Chapter 3: Discovering Security Concepts -- Introducing the principles of defense in depth -- Confidentiality -- Integrity -- Availability -- Combining the three pillars -- Exploring security terminologies -- Threats, vulnerabilities, and exploits -- Identifying threat actors -- Understanding runbook automation -- Chain of custody -- Reverse engineering -- PII and PHI -- Understanding risk -- Exploring access control models -- Discretionary access control -- Mandatory access control -- Rule-based access control -- Time-based access control.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification
|v Study guides.
|
650 |
|
6 |
|a Sécurité informatique
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a Computer security
|x Examinations.
|2 fast
|0 (OCoLC)fst00872489
|
650 |
|
7 |
|a Electronic data processing personnel
|x Certification.
|2 fast
|0 (OCoLC)fst00907100
|
655 |
|
7 |
|a Study guides.
|2 fast
|0 (OCoLC)fst01423888
|
776 |
0 |
8 |
|i Print version:
|z 9781800560871
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781800560871/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6824393
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH38625269
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2924455
|
994 |
|
|
|a 92
|b IZTAP
|