Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents /
Questions -- Further reading -- Chapter 3: Discovering Security Concepts -- Introducing the principles of defense in depth -- Confidentiality -- Integrity -- Availability -- Combining the three pillars -- Exploring security terminologies -- Threats, vulnerabilities, and exploits -- Identifying threa...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing,
2021.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright and Credits
- Dedicated
- Contributors
- Table of Contents
- Preface
- Section 1: Network and Security Concepts
- Chapter 1: Exploring Networking Concepts
- Technical requirements
- The functions of the network layers
- The OSI reference model
- The TCP/IP protocol suite
- Understanding the purpose of various network protocols
- Transmission Control Protocol
- User Datagram Protocol
- Internet Protocol
- The Internet Control Message Protocol
- Lab
- inspecting ICMP messages with Wireshark
- Summary
- Questions
- Further reading
- Chapter 2: Exploring Network Components and Security Systems
- Technical requirements
- Exploring various network services
- Address Resolution Protocol
- Domain Name System
- Dynamic Host Configuration Protocol
- Discovering the role and operations of network devices
- Hubs
- Switches
- Layer 3 switches
- Routers
- Wireless Access Point (WAP)
- Wireless LAN Controller (WLC)
- Describing the functions of Cisco network security systems
- Firewall
- Cisco Intrusion Prevention System (IPS)
- Web Security Appliance
- Email Security Appliance
- Cisco Advanced Malware Protection
- Role-based access control
- Authentication, authorization, and accounting
- Understanding security deployment
- Summary
- Questions
- Section 2: Principles of Security Monitoring
- Chapter 4: Understanding Security Principles
- Technical requirements
- Understanding a security operation center
- Types of SOC
- Elements of an SOC
- Understanding the security tools used to inspect data types on a network
- Attack surface and vulnerability
- tcpdump
- NetFlow
- Application visibility and control
- Web content filtering
- Email content filtering
- Understanding the impact of data visibility through networking technologies
- Access control lists
- NAT and PAT
- Tunneling, encapsulation, and encryption
- Peer-to-Peer (P2P) and TOR
- Load balancing
- Next-gen IPS event types
- Understanding how threat actors transport malicious code
- The domain name system
- The Network Time Protocol
- Web-based traffic
- Email-based traffic
- Delving into data types used during security monitoring
- Session data
- Transaction data
- Full packet capture
- Statistical data
- Extracted content (metadata)
- Alert data
- Summary
- Questions