Cargando…

Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents /

Questions -- Further reading -- Chapter 3: Discovering Security Concepts -- Introducing the principles of defense in depth -- Confidentiality -- Integrity -- Availability -- Combining the three pillars -- Exploring security terminologies -- Threats, vulnerabilities, and exploits -- Identifying threa...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Singh, Glen D. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2021.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_on1256686369
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 210510s2021 enk fo 000 0 eng d
040 |a UKAHL  |b eng  |e rda  |e pn  |c UKAHL  |d UKMGB  |d OCLCO  |d OCLCF  |d N$T  |d EBLCP  |d N$T  |d OCLCO  |d OCLCQ  |d IEEEE 
015 |a GBC174114  |2 bnb 
016 7 |a 020189218  |2 Uk 
020 |a 1800563485 
020 |a 9781800563483  |q (electronic bk.) 
020 |z 9781800560871 (pbk.) 
029 1 |a UKMGB  |b 020189218 
029 1 |a AU@  |b 000069351167 
035 |a (OCoLC)1256686369 
037 |a 9781800563483  |b Packt Publishing Pvt. Ltd 
037 |a 10163155  |b IEEE 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Singh, Glen D.,  |e author. 
245 1 0 |a Cisco Certified CyberOps Associate 200-201 certification guide :  |b learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents /  |c Glen D. Singh. 
264 1 |a Birmingham :  |b Packt Publishing,  |c 2021. 
300 |a 1 online resource 
336 |a text  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
505 0 |a Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Section 1: Network and Security Concepts -- Chapter 1: Exploring Networking Concepts -- Technical requirements -- The functions of the network layers -- The OSI reference model -- The TCP/IP protocol suite -- Understanding the purpose of various network protocols -- Transmission Control Protocol -- User Datagram Protocol -- Internet Protocol -- The Internet Control Message Protocol -- Lab -- inspecting ICMP messages with Wireshark -- Summary -- Questions -- Further reading 
505 8 |a Chapter 2: Exploring Network Components and Security Systems -- Technical requirements -- Exploring various network services -- Address Resolution Protocol -- Domain Name System -- Dynamic Host Configuration Protocol -- Discovering the role and operations of network devices -- Hubs -- Switches -- Layer 3 switches -- Routers -- Wireless Access Point (WAP) -- Wireless LAN Controller (WLC) -- Describing the functions of Cisco network security systems -- Firewall -- Cisco Intrusion Prevention System (IPS) -- Web Security Appliance -- Email Security Appliance -- Cisco Advanced Malware Protection 
505 8 |a Role-based access control -- Authentication, authorization, and accounting -- Understanding security deployment -- Summary -- Questions -- Section 2: Principles of Security Monitoring -- Chapter 4: Understanding Security Principles -- Technical requirements -- Understanding a security operation center -- Types of SOC -- Elements of an SOC -- Understanding the security tools used to inspect data types on a network -- Attack surface and vulnerability -- tcpdump -- NetFlow -- Application visibility and control -- Web content filtering -- Email content filtering 
505 8 |a Understanding the impact of data visibility through networking technologies -- Access control lists -- NAT and PAT -- Tunneling, encapsulation, and encryption -- Peer-to-Peer (P2P) and TOR -- Load balancing -- Next-gen IPS event types -- Understanding how threat actors transport malicious code -- The domain name system -- The Network Time Protocol -- Web-based traffic -- Email-based traffic -- Delving into data types used during security monitoring -- Session data -- Transaction data -- Full packet capture -- Statistical data -- Extracted content (metadata) -- Alert data -- Summary -- Questions 
520 |a Questions -- Further reading -- Chapter 3: Discovering Security Concepts -- Introducing the principles of defense in depth -- Confidentiality -- Integrity -- Availability -- Combining the three pillars -- Exploring security terminologies -- Threats, vulnerabilities, and exploits -- Identifying threat actors -- Understanding runbook automation -- Chain of custody -- Reverse engineering -- PII and PHI -- Understanding risk -- Exploring access control models -- Discretionary access control -- Mandatory access control -- Rule-based access control -- Time-based access control. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Examinations  |v Study guides. 
650 0 |a Electronic data processing personnel  |x Certification  |v Study guides. 
650 6 |a Sécurité informatique  |x Examens  |v Guides de l'étudiant. 
650 7 |a Computer security  |x Examinations.  |2 fast  |0 (OCoLC)fst00872489 
650 7 |a Electronic data processing personnel  |x Certification.  |2 fast  |0 (OCoLC)fst00907100 
655 7 |a Study guides.  |2 fast  |0 (OCoLC)fst01423888 
776 0 8 |i Print version:  |z 9781800560871 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781800560871/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6824393 
938 |a Askews and Holts Library Services  |b ASKH  |n AH38625269 
938 |a EBSCOhost  |b EBSC  |n 2924455 
994 |a 92  |b IZTAP