Skip to content
You are not logged in |Login  
     
Limit search to available items
Record 2 of 2
Record:   Prev Next
Resources
More Information
Bestseller
BestsellerE-book
Author Singh, Glen D., author.

Title Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents / Glen D. Singh.

Publication Info. Birmingham : Packt Publishing, 2021.

Item Status

Description 1 online resource
Contents Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Section 1: Network and Security Concepts -- Chapter 1: Exploring Networking Concepts -- Technical requirements -- The functions of the network layers -- The OSI reference model -- The TCP/IP protocol suite -- Understanding the purpose of various network protocols -- Transmission Control Protocol -- User Datagram Protocol -- Internet Protocol -- The Internet Control Message Protocol -- Lab -- inspecting ICMP messages with Wireshark -- Summary -- Questions -- Further reading
Chapter 2: Exploring Network Components and Security Systems -- Technical requirements -- Exploring various network services -- Address Resolution Protocol -- Domain Name System -- Dynamic Host Configuration Protocol -- Discovering the role and operations of network devices -- Hubs -- Switches -- Layer 3 switches -- Routers -- Wireless Access Point (WAP) -- Wireless LAN Controller (WLC) -- Describing the functions of Cisco network security systems -- Firewall -- Cisco Intrusion Prevention System (IPS) -- Web Security Appliance -- Email Security Appliance -- Cisco Advanced Malware Protection
Role-based access control -- Authentication, authorization, and accounting -- Understanding security deployment -- Summary -- Questions -- Section 2: Principles of Security Monitoring -- Chapter 4: Understanding Security Principles -- Technical requirements -- Understanding a security operation center -- Types of SOC -- Elements of an SOC -- Understanding the security tools used to inspect data types on a network -- Attack surface and vulnerability -- tcpdump -- NetFlow -- Application visibility and control -- Web content filtering -- Email content filtering
Understanding the impact of data visibility through networking technologies -- Access control lists -- NAT and PAT -- Tunneling, encapsulation, and encryption -- Peer-to-Peer (P2P) and TOR -- Load balancing -- Next-gen IPS event types -- Understanding how threat actors transport malicious code -- The domain name system -- The Network Time Protocol -- Web-based traffic -- Email-based traffic -- Delving into data types used during security monitoring -- Session data -- Transaction data -- Full packet capture -- Statistical data -- Extracted content (metadata) -- Alert data -- Summary -- Questions
Summary Questions -- Further reading -- Chapter 3: Discovering Security Concepts -- Introducing the principles of defense in depth -- Confidentiality -- Integrity -- Availability -- Combining the three pillars -- Exploring security terminologies -- Threats, vulnerabilities, and exploits -- Identifying threat actors -- Understanding runbook automation -- Chain of custody -- Reverse engineering -- PII and PHI -- Understanding risk -- Exploring access control models -- Discretionary access control -- Mandatory access control -- Rule-based access control -- Time-based access control.
Local Note eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America
Subject Computer security -- Examinations -- Study guides.
Electronic data processing personnel -- Certification -- Study guides.
Computer security -- Examinations
Electronic data processing personnel -- Certification
Genre/Form Study guides
Other Form: Print version: 9781800560871
ISBN 1800563485
9781800563483 (electronic bk.)
9781800560871 (pbk.)