Description |
1 online resource |
Contents |
Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Section 1: Network and Security Concepts -- Chapter 1: Exploring Networking Concepts -- Technical requirements -- The functions of the network layers -- The OSI reference model -- The TCP/IP protocol suite -- Understanding the purpose of various network protocols -- Transmission Control Protocol -- User Datagram Protocol -- Internet Protocol -- The Internet Control Message Protocol -- Lab -- inspecting ICMP messages with Wireshark -- Summary -- Questions -- Further reading |
|
Chapter 2: Exploring Network Components and Security Systems -- Technical requirements -- Exploring various network services -- Address Resolution Protocol -- Domain Name System -- Dynamic Host Configuration Protocol -- Discovering the role and operations of network devices -- Hubs -- Switches -- Layer 3 switches -- Routers -- Wireless Access Point (WAP) -- Wireless LAN Controller (WLC) -- Describing the functions of Cisco network security systems -- Firewall -- Cisco Intrusion Prevention System (IPS) -- Web Security Appliance -- Email Security Appliance -- Cisco Advanced Malware Protection |
|
Role-based access control -- Authentication, authorization, and accounting -- Understanding security deployment -- Summary -- Questions -- Section 2: Principles of Security Monitoring -- Chapter 4: Understanding Security Principles -- Technical requirements -- Understanding a security operation center -- Types of SOC -- Elements of an SOC -- Understanding the security tools used to inspect data types on a network -- Attack surface and vulnerability -- tcpdump -- NetFlow -- Application visibility and control -- Web content filtering -- Email content filtering |
|
Understanding the impact of data visibility through networking technologies -- Access control lists -- NAT and PAT -- Tunneling, encapsulation, and encryption -- Peer-to-Peer (P2P) and TOR -- Load balancing -- Next-gen IPS event types -- Understanding how threat actors transport malicious code -- The domain name system -- The Network Time Protocol -- Web-based traffic -- Email-based traffic -- Delving into data types used during security monitoring -- Session data -- Transaction data -- Full packet capture -- Statistical data -- Extracted content (metadata) -- Alert data -- Summary -- Questions |
Summary |
Questions -- Further reading -- Chapter 3: Discovering Security Concepts -- Introducing the principles of defense in depth -- Confidentiality -- Integrity -- Availability -- Combining the three pillars -- Exploring security terminologies -- Threats, vulnerabilities, and exploits -- Identifying threat actors -- Understanding runbook automation -- Chain of custody -- Reverse engineering -- PII and PHI -- Understanding risk -- Exploring access control models -- Discretionary access control -- Mandatory access control -- Rule-based access control -- Time-based access control. |
Local Note |
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America |
Subject |
Computer security -- Examinations -- Study guides.
|
|
Electronic data processing personnel -- Certification -- Study guides.
|
|
Computer security -- Examinations |
|
Electronic data processing personnel -- Certification |
Genre/Form |
Study guides
|
Other Form: |
Print version: 9781800560871 |
ISBN |
1800563485 |
|
9781800563483 (electronic bk.) |
|
9781800560871 (pbk.) |
|