Book description
CCNA Cybersecurity Operations Companion Guide is the official supplemental textbook for the Cisco Networking Academy CCNA Cybersecurity Operations course.
The course emphasizes real-world practical application, while providing opportunities for you to gain the skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level security analyst working in a security operations center (SOC).
The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.
The book’s features help you focus on important concepts to succeed in this course:
- Chapter Objectives—Review core concepts by answering the focus questions listed at the beginning of each chapter.
- Key Terms—Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
- Glossary—Consult the comprehensive Glossary with more than 360 terms.
- Summary of Activities and Labs—Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
- Check Your Understanding—Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.
How To—Look for this icon to study the steps you need to learn to perform certain tasks.
Interactive Activities—Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon.
Packet Tracer Activities—Explore and visualize networking concepts using Packet Tracer. There are exercises interspersed throughout the chapters and provided in the accompanying Lab Manual book.
Videos—Watch the videos embedded within the online course.
Hands-on Labs—Develop critical thinking and complex problem-solving skills by completing the labs and activities included in the course and published in the separate Lab Manual.
Table of contents
- Cover Page
- Title Page
- Copyright Page
- About the Contributing Author
- Contents at a Glance
- Contents
- Command Syntax Conventions
- Introduction
- Chapter 1 Cybersecurity and the Security Operations Center
- Chapter 2 Windows Operating System
-
Chapter 3 Linux Operating System
- Objectives
- Key Terms
- Introduction (3.0)
- Linux Overview (3.1)
- Linux Administration (3.2)
- Linux Hosts (3.3)
- Summary (3.4)
- Practice
- Check Your Understanding
-
Chapter 4 Network Protocols and Services
- Objectives
- Key Terms
- Introduction (4.0)
-
Network Protocols (4.1)
- Network Communications Process (4.1.1)
-
Communications Protocols (4.1.2)
- What Are Protocols? (4.1.2.1)
- Network Protocol Suites (4.1.2.2)
- The TCP/IP Protocol Suite (4.1.2.3)
- Format, Size, and Timing (4.1.2.4)
- Unicast, Multicast, and Broadcast (4.1.2.5)
- Reference Models (4.1.2.6)
- Three Addresses (4.1.2.7)
- Encapsulation (4.1.2.8)
- Scenario: Sending and Receiving a Web Page (4.1.2.9)
- Ethernet and Internet Protocol (IP) (4.2)
- Connectivity Verification (4.3)
- Address Resolution Protocol (4.4)
- The Transport Layer (4.5)
- Network Services (4.6)
- Summary (4.7)
- Practice
- Check Your Understanding
-
Chapter 5 Network Infrastructure
- Objectives
- Key Terms
- Introduction (5.0)
- Network Communication Devices (5.1)
-
Network Security Infrastructure (5.2)
-
Security Devices (5.2.1)
- Firewalls (5.2.1.2)
- Firewall Type Descriptions (5.2.1.3)
- Packet Filtering Firewalls (5.2.1.4)
- Stateful Firewalls (5.2.1.5)
- Next-Generation Firewalls (5.2.1.6)
- Intrusion Protection and Detection Devices (5.2.1.8)
- Advantages and Disadvantages of IDS and IPS (5.2.1.9)
- Types of IPS (5.2.1.10)
- Specialized Security Appliances (5.2.1.11)
- Security Services (5.2.2)
-
Security Devices (5.2.1)
- Network Representations (5.3)
- Summary (5.4)
- Practice
- Check Your Understanding
-
Chapter 6 Principles of Network Security
- Objectives
- Key Terms
- Introduction (6.0)
- Attackers and Their Tools (6.1)
-
Common Threats and Attacks (6.2)
- Malware (6.2.1)
-
Common Network Attacks (6.2.2)
- Types of Network Attacks (6.2.2.1)
- Reconnaissance Attacks (6.2.2.2)
- Sample Reconnaissance Attacks (6.2.2.3)
- Access Attacks (6.2.2.4)
- Types of Access Attacks (6.2.2.5)
- Social Engineering Attacks (6.2.2.6)
- Phishing Social Engineering Attacks (6.2.2.7)
- Strengthening the Weakest Link (6.2.2.8)
- Denial-of-Service Attacks (6.2.2.10)
- DDoS Attacks (6.2.2.11)
- Example DDoS Attack (6.2.2.12)
- Buffer Overflow Attack (6.2.2.13)
- Evasion Methods (6.2.2.14)
- Summary (6.3)
- Practice
- Check Your Understanding
-
Chapter 7 Network Attacks: A Deeper Look
- Objectives
- Key Terms
- Introduction (7.0)
- Network Monitoring and Tools (7.1)
- Attacking the Foundation (7.2)
- Attacking What We Do (7.3)
- Summary (7.4)
- Practice
- Check Your Understanding
- Chapter 8 Protecting the Network
-
Chapter 9 Cryptography and the Public Key Infrastructure
- Objectives
- Key Terms
- Introduction (9.0)
-
Cryptography (9.1)
- What Is Cryptography? (9.1.1)
- Integrity and Authenticity (9.1.2)
-
Confidentiality (9.1.3)
- Encryption (9.1.3.1)
- Symmetric Encryption (9.1.3.2)
- Symmetric Encryption Algorithms (9.1.3.3)
- Asymmetric Encryption Algorithms (9.1.3.4)
- Asymmetric Encryption: Confidentiality (9.1.3.5)
- Asymmetric Encryption: Authentication (9.1.3.6)
- Asymmetric Encryption: Integrity (9.1.3.7)
- Diffie-Hellman (9.1.3.8)
- Public Key Infrastructure (9.2)
- Summary (9.3)
- Practice
- Check Your Understanding
-
Chapter 10 Endpoint Security and Analysis
- Objectives
- Key Terms
- Introduction (10.0)
- Endpoint Protection (10.1)
- Endpoint Vulnerability Assessment (10.2)
- Summary (10.3)
- Practice
- Check Your Understanding
- Chapter 11 Security Monitoring
-
Chapter 12 Intrusion Data Analysis
- Objectives
- Key Terms
- Introduction (12.0)
- Evaluating Alerts (12.1)
- Working with Network Security Data (12.2)
- Digital Forensics (12.3)
- Summary (12.4)
- Practice
- Check Your Understanding
-
Chapter 13 Incident Response and Handling
- Objectives
- Key Terms
- Introduction (13.0)
- Incident Response Models (13.1)
-
Incident Handling (13.2)
- CSIRTs (13.2.1)
-
NIST 800-61r2 (13.2.2)
- Establishing an Incident Response Capability (13.2.2.1)
- Incident Response Stakeholders (13.2.2.2)
- NIST Incident Response Life Cycle (13.2.2.3)
- Preparation (13.2.2.4)
- Detection and Analysis (13.2.2.5)
- Containment, Eradication, and Recovery (13.2.2.6)
- Post-Incident Activities (13.2.2.7)
- Incident Data Collection and Retention (13.2.2.8)
- Reporting Requirements and Information Sharing (13.2.2.9)
- Summary (13.3)
- Practice
- Check Your Understanding
- Appendix A Answers to the “Check Your Understanding” Questions
- Glossary
- Index
- Code Snippets
Product information
- Title: CCNA Cybersecurity Operations Companion Guide, First Edition
- Author(s):
- Release date: June 2018
- Publisher(s): Cisco Press
- ISBN: 9780135166253
You might also like
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …
book
CCNA Cyber Ops SECFND #210-250 Official Cert Guide
CCNA Cyber Ops SECFND 210-250 Official Cert Guide from Cisco Press allows you to succeed on …
book
CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide
The official Cisco Press Certification Guide designed to help candidates prepare for the new SNCF 300-710 …
book
CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and …