Cisco Certified CyberOps Associate 200-201 certification guide :: learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents /
Questions -- Further reading -- Chapter 3: Discovering Security Concepts -- Introducing the principles of defense in depth -- Confidentiality -- Integrity -- Availability -- Combining the three pillars -- Exploring security terminologies -- Threats, vulnerabilities, and exploits -- Identifying threa...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing,
2021.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Questions -- Further reading -- Chapter 3: Discovering Security Concepts -- Introducing the principles of defense in depth -- Confidentiality -- Integrity -- Availability -- Combining the three pillars -- Exploring security terminologies -- Threats, vulnerabilities, and exploits -- Identifying threat actors -- Understanding runbook automation -- Chain of custody -- Reverse engineering -- PII and PHI -- Understanding risk -- Exploring access control models -- Discretionary access control -- Mandatory access control -- Rule-based access control -- Time-based access control. |
Beschreibung: | 1 online resource |
ISBN: | 1800563485 9781800563483 |
Internformat
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1256686369 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 210510s2021 enk fo 000 0 eng d | ||
040 | |a UKAHL |b eng |e rda |e pn |c UKAHL |d UKMGB |d OCLCO |d OCLCF |d N$T |d EBLCP |d N$T |d OCLCO |d OCLCQ |d IEEEE |d OCLCO |d OCLCL | ||
015 | |a GBC174114 |2 bnb | ||
016 | 7 | |a 020189218 |2 Uk | |
020 | |a 1800563485 | ||
020 | |a 9781800563483 |q (electronic bk.) | ||
020 | |z 9781800560871 (pbk.) | ||
035 | |a (OCoLC)1256686369 | ||
037 | |a 9781800563483 |b Packt Publishing Pvt. Ltd | ||
037 | |a 10163155 |b IEEE | ||
050 | 4 | |a QA76.9.A25 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Singh, Glen D., |e author. | |
245 | 1 | 0 | |a Cisco Certified CyberOps Associate 200-201 certification guide : |b learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents / |c Glen D. Singh. |
264 | 1 | |a Birmingham : |b Packt Publishing, |c 2021. | |
300 | |a 1 online resource | ||
336 | |a text |2 rdacontent | ||
337 | |a computer |2 rdamedia | ||
338 | |a online resource |2 rdacarrier | ||
505 | 0 | |a Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Section 1: Network and Security Concepts -- Chapter 1: Exploring Networking Concepts -- Technical requirements -- The functions of the network layers -- The OSI reference model -- The TCP/IP protocol suite -- Understanding the purpose of various network protocols -- Transmission Control Protocol -- User Datagram Protocol -- Internet Protocol -- The Internet Control Message Protocol -- Lab -- inspecting ICMP messages with Wireshark -- Summary -- Questions -- Further reading | |
505 | 8 | |a Chapter 2: Exploring Network Components and Security Systems -- Technical requirements -- Exploring various network services -- Address Resolution Protocol -- Domain Name System -- Dynamic Host Configuration Protocol -- Discovering the role and operations of network devices -- Hubs -- Switches -- Layer 3 switches -- Routers -- Wireless Access Point (WAP) -- Wireless LAN Controller (WLC) -- Describing the functions of Cisco network security systems -- Firewall -- Cisco Intrusion Prevention System (IPS) -- Web Security Appliance -- Email Security Appliance -- Cisco Advanced Malware Protection | |
505 | 8 | |a Role-based access control -- Authentication, authorization, and accounting -- Understanding security deployment -- Summary -- Questions -- Section 2: Principles of Security Monitoring -- Chapter 4: Understanding Security Principles -- Technical requirements -- Understanding a security operation center -- Types of SOC -- Elements of an SOC -- Understanding the security tools used to inspect data types on a network -- Attack surface and vulnerability -- tcpdump -- NetFlow -- Application visibility and control -- Web content filtering -- Email content filtering | |
505 | 8 | |a Understanding the impact of data visibility through networking technologies -- Access control lists -- NAT and PAT -- Tunneling, encapsulation, and encryption -- Peer-to-Peer (P2P) and TOR -- Load balancing -- Next-gen IPS event types -- Understanding how threat actors transport malicious code -- The domain name system -- The Network Time Protocol -- Web-based traffic -- Email-based traffic -- Delving into data types used during security monitoring -- Session data -- Transaction data -- Full packet capture -- Statistical data -- Extracted content (metadata) -- Alert data -- Summary -- Questions | |
520 | |a Questions -- Further reading -- Chapter 3: Discovering Security Concepts -- Introducing the principles of defense in depth -- Confidentiality -- Integrity -- Availability -- Combining the three pillars -- Exploring security terminologies -- Threats, vulnerabilities, and exploits -- Identifying threat actors -- Understanding runbook automation -- Chain of custody -- Reverse engineering -- PII and PHI -- Understanding risk -- Exploring access control models -- Discretionary access control -- Mandatory access control -- Rule-based access control -- Time-based access control. | ||
650 | 0 | |a Computer security |x Examinations |v Study guides. | |
650 | 0 | |a Electronic data processing personnel |x Certification |v Study guides. | |
650 | 6 | |a Sécurité informatique |x Examens |v Guides de l'étudiant. | |
650 | 7 | |a Computer security |x Examinations |2 fast | |
650 | 7 | |a Electronic data processing personnel |x Certification |2 fast | |
655 | 7 | |a Study guides |2 fast | |
758 | |i has work: |a Cisco Certified CyberOps Associate 200-201 Certification Guide (Text) |1 https://id.oclc.org/worldcat/entity/E39PCXTQp9R6tjMDDjKPYgYPpP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |z 9781800560871 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2924455 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL6824393 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH38625269 | ||
938 | |a EBSCOhost |b EBSC |n 2924455 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1256686369 |
---|---|
_version_ | 1816882545791336448 |
adam_text | |
any_adam_object | |
author | Singh, Glen D. |
author_facet | Singh, Glen D. |
author_role | aut |
author_sort | Singh, Glen D. |
author_variant | g d s gd gds |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Section 1: Network and Security Concepts -- Chapter 1: Exploring Networking Concepts -- Technical requirements -- The functions of the network layers -- The OSI reference model -- The TCP/IP protocol suite -- Understanding the purpose of various network protocols -- Transmission Control Protocol -- User Datagram Protocol -- Internet Protocol -- The Internet Control Message Protocol -- Lab -- inspecting ICMP messages with Wireshark -- Summary -- Questions -- Further reading Chapter 2: Exploring Network Components and Security Systems -- Technical requirements -- Exploring various network services -- Address Resolution Protocol -- Domain Name System -- Dynamic Host Configuration Protocol -- Discovering the role and operations of network devices -- Hubs -- Switches -- Layer 3 switches -- Routers -- Wireless Access Point (WAP) -- Wireless LAN Controller (WLC) -- Describing the functions of Cisco network security systems -- Firewall -- Cisco Intrusion Prevention System (IPS) -- Web Security Appliance -- Email Security Appliance -- Cisco Advanced Malware Protection Role-based access control -- Authentication, authorization, and accounting -- Understanding security deployment -- Summary -- Questions -- Section 2: Principles of Security Monitoring -- Chapter 4: Understanding Security Principles -- Technical requirements -- Understanding a security operation center -- Types of SOC -- Elements of an SOC -- Understanding the security tools used to inspect data types on a network -- Attack surface and vulnerability -- tcpdump -- NetFlow -- Application visibility and control -- Web content filtering -- Email content filtering Understanding the impact of data visibility through networking technologies -- Access control lists -- NAT and PAT -- Tunneling, encapsulation, and encryption -- Peer-to-Peer (P2P) and TOR -- Load balancing -- Next-gen IPS event types -- Understanding how threat actors transport malicious code -- The domain name system -- The Network Time Protocol -- Web-based traffic -- Email-based traffic -- Delving into data types used during security monitoring -- Session data -- Transaction data -- Full packet capture -- Statistical data -- Extracted content (metadata) -- Alert data -- Summary -- Questions |
ctrlnum | (OCoLC)1256686369 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05076cam a2200541Mi 4500</leader><controlfield tag="001">ZDB-4-EBA-on1256686369</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">210510s2021 enk fo 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UKAHL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UKAHL</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">N$T</subfield><subfield code="d">EBLCP</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IEEEE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC174114</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">020189218</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1800563485</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781800563483</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781800560871 (pbk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1256686369</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781800563483</subfield><subfield code="b">Packt Publishing Pvt. Ltd</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">10163155</subfield><subfield code="b">IEEE</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Singh, Glen D.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cisco Certified CyberOps Associate 200-201 certification guide :</subfield><subfield code="b">learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents /</subfield><subfield code="c">Glen D. Singh.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Section 1: Network and Security Concepts -- Chapter 1: Exploring Networking Concepts -- Technical requirements -- The functions of the network layers -- The OSI reference model -- The TCP/IP protocol suite -- Understanding the purpose of various network protocols -- Transmission Control Protocol -- User Datagram Protocol -- Internet Protocol -- The Internet Control Message Protocol -- Lab -- inspecting ICMP messages with Wireshark -- Summary -- Questions -- Further reading</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 2: Exploring Network Components and Security Systems -- Technical requirements -- Exploring various network services -- Address Resolution Protocol -- Domain Name System -- Dynamic Host Configuration Protocol -- Discovering the role and operations of network devices -- Hubs -- Switches -- Layer 3 switches -- Routers -- Wireless Access Point (WAP) -- Wireless LAN Controller (WLC) -- Describing the functions of Cisco network security systems -- Firewall -- Cisco Intrusion Prevention System (IPS) -- Web Security Appliance -- Email Security Appliance -- Cisco Advanced Malware Protection</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Role-based access control -- Authentication, authorization, and accounting -- Understanding security deployment -- Summary -- Questions -- Section 2: Principles of Security Monitoring -- Chapter 4: Understanding Security Principles -- Technical requirements -- Understanding a security operation center -- Types of SOC -- Elements of an SOC -- Understanding the security tools used to inspect data types on a network -- Attack surface and vulnerability -- tcpdump -- NetFlow -- Application visibility and control -- Web content filtering -- Email content filtering</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Understanding the impact of data visibility through networking technologies -- Access control lists -- NAT and PAT -- Tunneling, encapsulation, and encryption -- Peer-to-Peer (P2P) and TOR -- Load balancing -- Next-gen IPS event types -- Understanding how threat actors transport malicious code -- The domain name system -- The Network Time Protocol -- Web-based traffic -- Email-based traffic -- Delving into data types used during security monitoring -- Session data -- Transaction data -- Full packet capture -- Statistical data -- Extracted content (metadata) -- Alert data -- Summary -- Questions</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Questions -- Further reading -- Chapter 3: Discovering Security Concepts -- Introducing the principles of defense in depth -- Confidentiality -- Integrity -- Availability -- Combining the three pillars -- Exploring security terminologies -- Threats, vulnerabilities, and exploits -- Identifying threat actors -- Understanding runbook automation -- Chain of custody -- Reverse engineering -- PII and PHI -- Understanding risk -- Exploring access control models -- Discretionary access control -- Mandatory access control -- Rule-based access control -- Time-based access control.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Examinations</subfield><subfield code="v">Study guides.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing personnel</subfield><subfield code="x">Certification</subfield><subfield code="v">Study guides.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Examens</subfield><subfield code="v">Guides de l'étudiant.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Examinations</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic data processing personnel</subfield><subfield code="x">Certification</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Study guides</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cisco Certified CyberOps Associate 200-201 Certification Guide (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCXTQp9R6tjMDDjKPYgYPpP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9781800560871</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2924455</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6824393</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH38625269</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2924455</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Study guides fast |
genre_facet | Study guides |
id | ZDB-4-EBA-on1256686369 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:30:19Z |
institution | BVB |
isbn | 1800563485 9781800563483 |
language | English |
oclc_num | 1256686369 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Singh, Glen D., author. Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents / Glen D. Singh. Birmingham : Packt Publishing, 2021. 1 online resource text rdacontent computer rdamedia online resource rdacarrier Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Section 1: Network and Security Concepts -- Chapter 1: Exploring Networking Concepts -- Technical requirements -- The functions of the network layers -- The OSI reference model -- The TCP/IP protocol suite -- Understanding the purpose of various network protocols -- Transmission Control Protocol -- User Datagram Protocol -- Internet Protocol -- The Internet Control Message Protocol -- Lab -- inspecting ICMP messages with Wireshark -- Summary -- Questions -- Further reading Chapter 2: Exploring Network Components and Security Systems -- Technical requirements -- Exploring various network services -- Address Resolution Protocol -- Domain Name System -- Dynamic Host Configuration Protocol -- Discovering the role and operations of network devices -- Hubs -- Switches -- Layer 3 switches -- Routers -- Wireless Access Point (WAP) -- Wireless LAN Controller (WLC) -- Describing the functions of Cisco network security systems -- Firewall -- Cisco Intrusion Prevention System (IPS) -- Web Security Appliance -- Email Security Appliance -- Cisco Advanced Malware Protection Role-based access control -- Authentication, authorization, and accounting -- Understanding security deployment -- Summary -- Questions -- Section 2: Principles of Security Monitoring -- Chapter 4: Understanding Security Principles -- Technical requirements -- Understanding a security operation center -- Types of SOC -- Elements of an SOC -- Understanding the security tools used to inspect data types on a network -- Attack surface and vulnerability -- tcpdump -- NetFlow -- Application visibility and control -- Web content filtering -- Email content filtering Understanding the impact of data visibility through networking technologies -- Access control lists -- NAT and PAT -- Tunneling, encapsulation, and encryption -- Peer-to-Peer (P2P) and TOR -- Load balancing -- Next-gen IPS event types -- Understanding how threat actors transport malicious code -- The domain name system -- The Network Time Protocol -- Web-based traffic -- Email-based traffic -- Delving into data types used during security monitoring -- Session data -- Transaction data -- Full packet capture -- Statistical data -- Extracted content (metadata) -- Alert data -- Summary -- Questions Questions -- Further reading -- Chapter 3: Discovering Security Concepts -- Introducing the principles of defense in depth -- Confidentiality -- Integrity -- Availability -- Combining the three pillars -- Exploring security terminologies -- Threats, vulnerabilities, and exploits -- Identifying threat actors -- Understanding runbook automation -- Chain of custody -- Reverse engineering -- PII and PHI -- Understanding risk -- Exploring access control models -- Discretionary access control -- Mandatory access control -- Rule-based access control -- Time-based access control. Computer security Examinations Study guides. Electronic data processing personnel Certification Study guides. Sécurité informatique Examens Guides de l'étudiant. Computer security Examinations fast Electronic data processing personnel Certification fast Study guides fast has work: Cisco Certified CyberOps Associate 200-201 Certification Guide (Text) https://id.oclc.org/worldcat/entity/E39PCXTQp9R6tjMDDjKPYgYPpP https://id.oclc.org/worldcat/ontology/hasWork Print version: 9781800560871 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2924455 Volltext |
spellingShingle | Singh, Glen D. Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents / Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Section 1: Network and Security Concepts -- Chapter 1: Exploring Networking Concepts -- Technical requirements -- The functions of the network layers -- The OSI reference model -- The TCP/IP protocol suite -- Understanding the purpose of various network protocols -- Transmission Control Protocol -- User Datagram Protocol -- Internet Protocol -- The Internet Control Message Protocol -- Lab -- inspecting ICMP messages with Wireshark -- Summary -- Questions -- Further reading Chapter 2: Exploring Network Components and Security Systems -- Technical requirements -- Exploring various network services -- Address Resolution Protocol -- Domain Name System -- Dynamic Host Configuration Protocol -- Discovering the role and operations of network devices -- Hubs -- Switches -- Layer 3 switches -- Routers -- Wireless Access Point (WAP) -- Wireless LAN Controller (WLC) -- Describing the functions of Cisco network security systems -- Firewall -- Cisco Intrusion Prevention System (IPS) -- Web Security Appliance -- Email Security Appliance -- Cisco Advanced Malware Protection Role-based access control -- Authentication, authorization, and accounting -- Understanding security deployment -- Summary -- Questions -- Section 2: Principles of Security Monitoring -- Chapter 4: Understanding Security Principles -- Technical requirements -- Understanding a security operation center -- Types of SOC -- Elements of an SOC -- Understanding the security tools used to inspect data types on a network -- Attack surface and vulnerability -- tcpdump -- NetFlow -- Application visibility and control -- Web content filtering -- Email content filtering Understanding the impact of data visibility through networking technologies -- Access control lists -- NAT and PAT -- Tunneling, encapsulation, and encryption -- Peer-to-Peer (P2P) and TOR -- Load balancing -- Next-gen IPS event types -- Understanding how threat actors transport malicious code -- The domain name system -- The Network Time Protocol -- Web-based traffic -- Email-based traffic -- Delving into data types used during security monitoring -- Session data -- Transaction data -- Full packet capture -- Statistical data -- Extracted content (metadata) -- Alert data -- Summary -- Questions Computer security Examinations Study guides. Electronic data processing personnel Certification Study guides. Sécurité informatique Examens Guides de l'étudiant. Computer security Examinations fast Electronic data processing personnel Certification fast |
title | Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents / |
title_auth | Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents / |
title_exact_search | Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents / |
title_full | Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents / Glen D. Singh. |
title_fullStr | Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents / Glen D. Singh. |
title_full_unstemmed | Cisco Certified CyberOps Associate 200-201 certification guide : learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents / Glen D. Singh. |
title_short | Cisco Certified CyberOps Associate 200-201 certification guide : |
title_sort | cisco certified cyberops associate 200 201 certification guide learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents |
title_sub | learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents / |
topic | Computer security Examinations Study guides. Electronic data processing personnel Certification Study guides. Sécurité informatique Examens Guides de l'étudiant. Computer security Examinations fast Electronic data processing personnel Certification fast |
topic_facet | Computer security Examinations Study guides. Electronic data processing personnel Certification Study guides. Sécurité informatique Examens Guides de l'étudiant. Computer security Examinations Electronic data processing personnel Certification Study guides |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2924455 |
work_keys_str_mv | AT singhglend ciscocertifiedcyberopsassociate200201certificationguidelearnblueteamingstrategiesandincidentresponsetechniquestomitigatecybersecurityincidents |