Muutke küpsiste eelistusi

Cyberops Associate Lab Manual [Pehme köide]

  • Formaat: Paperback / softback
  • Ilmumisaeg: 28-Jan-2021
  • Kirjastus: Cisco Press
  • ISBN-10: 0136875149
  • ISBN-13: 9780136875147
Cyberops Associate Lab Manual
  • Formaat: Paperback / softback
  • Ilmumisaeg: 28-Jan-2021
  • Kirjastus: Cisco Press
  • ISBN-10: 0136875149
  • ISBN-13: 9780136875147
The only authorized Lab Manual for the Cisco Networking Academy CCNA Cybersecurity Operations course Curriculum Objectives



Cisco Networking Academy Cybersecurity Operations covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC).



Upon completion of the CCNA Cybersecurity Operations course, students will be able to perform the following tasks:



Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events. Explain the role of the Cybersecurity Operations Analyst in the enterprise. Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses. Explain the features and characteristics of the Linux Operating System. Analyze the operation of network protocols and services. Explain the operation of the network infrastructure. Classify the various types of network attacks. Use network monitoring tools to identify attacks against network protocols and services. Use various methods to prevent malicious access to computer networks, hosts, and data. Explain the impacts of cryptography on network security monitoring. Explain how to investigate endpoint vulnerabilities and attacks. Analyze network intrusion data to verify potential exploits. Apply incident response models to manage network security incidents.
Previous Edition Table of Contents 

Chapter 1 Cybersecurity and the Security Operations Center

Chapter 2 Windows Operating System

Chapter 3 Linux Operating System

Chapter 4 Network Protocols and Services

Chapter 5 Network Infrastructure

Chapter 6 Principles of Network Security

Chapter 7 Network Attacks: A Deeper Look 

Chapter 8 Protecting the Network 

Chapter 9 Cryptography and the Public Key Infrastructure 

Chapter 10 Endpoint Security and Analysis

Chapter 11 Security Monitoring

Chapter 12 Intrusion Data Analysis 

Chapter 13 Incident Response and Handling