Cargando…

Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents /

Questions -- Further reading -- Chapter 3: Discovering Security Concepts -- Introducing the principles of defense in depth -- Confidentiality -- Integrity -- Availability -- Combining the three pillars -- Exploring security terminologies -- Threats, vulnerabilities, and exploits -- Identifying threa...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Singh, Glen D. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2021.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright and Credits
  • Dedicated
  • Contributors
  • Table of Contents
  • Preface
  • Section 1: Network and Security Concepts
  • Chapter 1: Exploring Networking Concepts
  • Technical requirements
  • The functions of the network layers
  • The OSI reference model
  • The TCP/IP protocol suite
  • Understanding the purpose of various network protocols
  • Transmission Control Protocol
  • User Datagram Protocol
  • Internet Protocol
  • The Internet Control Message Protocol
  • Lab
  • inspecting ICMP messages with Wireshark
  • Summary
  • Questions
  • Further reading
  • Chapter 2: Exploring Network Components and Security Systems
  • Technical requirements
  • Exploring various network services
  • Address Resolution Protocol
  • Domain Name System
  • Dynamic Host Configuration Protocol
  • Discovering the role and operations of network devices
  • Hubs
  • Switches
  • Layer 3 switches
  • Routers
  • Wireless Access Point (WAP)
  • Wireless LAN Controller (WLC)
  • Describing the functions of Cisco network security systems
  • Firewall
  • Cisco Intrusion Prevention System (IPS)
  • Web Security Appliance
  • Email Security Appliance
  • Cisco Advanced Malware Protection
  • Role-based access control
  • Authentication, authorization, and accounting
  • Understanding security deployment
  • Summary
  • Questions
  • Section 2: Principles of Security Monitoring
  • Chapter 4: Understanding Security Principles
  • Technical requirements
  • Understanding a security operation center
  • Types of SOC
  • Elements of an SOC
  • Understanding the security tools used to inspect data types on a network
  • Attack surface and vulnerability
  • tcpdump
  • NetFlow
  • Application visibility and control
  • Web content filtering
  • Email content filtering
  • Understanding the impact of data visibility through networking technologies
  • Access control lists
  • NAT and PAT
  • Tunneling, encapsulation, and encryption
  • Peer-to-Peer (P2P) and TOR
  • Load balancing
  • Next-gen IPS event types
  • Understanding how threat actors transport malicious code
  • The domain name system
  • The Network Time Protocol
  • Web-based traffic
  • Email-based traffic
  • Delving into data types used during security monitoring
  • Session data
  • Transaction data
  • Full packet capture
  • Statistical data
  • Extracted content (metadata)
  • Alert data
  • Summary
  • Questions