Book description
NoneTable of contents
- Cover Page
- Title Page
- Copyright Page
- About the Contributing Author
- Contents at a Glance
- Contents
- Command Syntax Conventions
- Introduction
- Chapter 1 Cybersecurity and the Security Operations Center
- Chapter 2 Windows Operating System
-
Chapter 3 Linux Operating System
- Objectives
- Key Terms
- Introduction (3.0)
- Linux Overview (3.1)
- Linux Administration (3.2)
- Linux Hosts (3.3)
- Summary (3.4)
- Practice
- Check Your Understanding
-
Chapter 4 Network Protocols and Services
- Objectives
- Key Terms
- Introduction (4.0)
-
Network Protocols (4.1)
- Network Communications Process (4.1.1)
-
Communications Protocols (4.1.2)
- What Are Protocols? (4.1.2.1)
- Network Protocol Suites (4.1.2.2)
- The TCP/IP Protocol Suite (4.1.2.3)
- Format, Size, and Timing (4.1.2.4)
- Unicast, Multicast, and Broadcast (4.1.2.5)
- Reference Models (4.1.2.6)
- Three Addresses (4.1.2.7)
- Encapsulation (4.1.2.8)
- Scenario: Sending and Receiving a Web Page (4.1.2.9)
- Ethernet and Internet Protocol (IP) (4.2)
- Connectivity Verification (4.3)
- Address Resolution Protocol (4.4)
- The Transport Layer (4.5)
- Network Services (4.6)
- Summary (4.7)
- Practice
- Check Your Understanding
-
Chapter 5 Network Infrastructure
- Objectives
- Key Terms
- Introduction (5.0)
- Network Communication Devices (5.1)
-
Network Security Infrastructure (5.2)
-
Security Devices (5.2.1)
- Firewalls (5.2.1.2)
- Firewall Type Descriptions (5.2.1.3)
- Packet Filtering Firewalls (5.2.1.4)
- Stateful Firewalls (5.2.1.5)
- Next-Generation Firewalls (5.2.1.6)
- Intrusion Protection and Detection Devices (5.2.1.8)
- Advantages and Disadvantages of IDS and IPS (5.2.1.9)
- Types of IPS (5.2.1.10)
- Specialized Security Appliances (5.2.1.11)
- Security Services (5.2.2)
-
Security Devices (5.2.1)
- Network Representations (5.3)
- Summary (5.4)
- Practice
- Check Your Understanding
-
Chapter 6 Principles of Network Security
- Objectives
- Key Terms
- Introduction (6.0)
- Attackers and Their Tools (6.1)
-
Common Threats and Attacks (6.2)
- Malware (6.2.1)
-
Common Network Attacks (6.2.2)
- Types of Network Attacks (6.2.2.1)
- Reconnaissance Attacks (6.2.2.2)
- Sample Reconnaissance Attacks (6.2.2.3)
- Access Attacks (6.2.2.4)
- Types of Access Attacks (6.2.2.5)
- Social Engineering Attacks (6.2.2.6)
- Phishing Social Engineering Attacks (6.2.2.7)
- Strengthening the Weakest Link (6.2.2.8)
- Denial-of-Service Attacks (6.2.2.10)
- DDoS Attacks (6.2.2.11)
- Example DDoS Attack (6.2.2.12)
- Buffer Overflow Attack (6.2.2.13)
- Evasion Methods (6.2.2.14)
- Summary (6.3)
- Practice
- Check Your Understanding
-
Chapter 7 Network Attacks: A Deeper Look
- Objectives
- Key Terms
- Introduction (7.0)
- Network Monitoring and Tools (7.1)
- Attacking the Foundation (7.2)
- Attacking What We Do (7.3)
- Summary (7.4)
- Practice
- Check Your Understanding
- Chapter 8 Protecting the Network
-
Chapter 9 Cryptography and the Public Key Infrastructure
- Objectives
- Key Terms
- Introduction (9.0)
-
Cryptography (9.1)
- What Is Cryptography? (9.1.1)
- Integrity and Authenticity (9.1.2)
-
Confidentiality (9.1.3)
- Encryption (9.1.3.1)
- Symmetric Encryption (9.1.3.2)
- Symmetric Encryption Algorithms (9.1.3.3)
- Asymmetric Encryption Algorithms (9.1.3.4)
- Asymmetric Encryption: Confidentiality (9.1.3.5)
- Asymmetric Encryption: Authentication (9.1.3.6)
- Asymmetric Encryption: Integrity (9.1.3.7)
- Diffie-Hellman (9.1.3.8)
- Public Key Infrastructure (9.2)
- Summary (9.3)
- Practice
- Check Your Understanding
-
Chapter 10 Endpoint Security and Analysis
- Objectives
- Key Terms
- Introduction (10.0)
- Endpoint Protection (10.1)
- Endpoint Vulnerability Assessment (10.2)
- Summary (10.3)
- Practice
- Check Your Understanding
- Chapter 11 Security Monitoring
-
Chapter 12 Intrusion Data Analysis
- Objectives
- Key Terms
- Introduction (12.0)
- Evaluating Alerts (12.1)
- Working with Network Security Data (12.2)
- Digital Forensics (12.3)
- Summary (12.4)
- Practice
- Check Your Understanding
-
Chapter 13 Incident Response and Handling
- Objectives
- Key Terms
- Introduction (13.0)
- Incident Response Models (13.1)
-
Incident Handling (13.2)
- CSIRTs (13.2.1)
-
NIST 800-61r2 (13.2.2)
- Establishing an Incident Response Capability (13.2.2.1)
- Incident Response Stakeholders (13.2.2.2)
- NIST Incident Response Life Cycle (13.2.2.3)
- Preparation (13.2.2.4)
- Detection and Analysis (13.2.2.5)
- Containment, Eradication, and Recovery (13.2.2.6)
- Post-Incident Activities (13.2.2.7)
- Incident Data Collection and Retention (13.2.2.8)
- Reporting Requirements and Information Sharing (13.2.2.9)
- Summary (13.3)
- Practice
- Check Your Understanding
- Appendix A Answers to the “Check Your Understanding” Questions
- Glossary
- Index
- Code Snippets
Product information
- Title: CCNA Cybersecurity Operations Companion Guide, First Edition
- Author(s):
- Release date:
- Publisher(s):
- ISBN: None
You might also like
video
CCNA 200-301
More Than 16 Hours of Video Instruction Overview CCNA 200-301 Complete Video Course is a comprehensive …
book
Security Awareness For Dummies
Make security a priority on your team Every organization needs a strong security program. One recent …
video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced
Develop your penetration testing skills and secure your computer systems and networks in the real world …
certs-practice-exam
Cisco CCNA 200-301 (Pearson Test Prep)
Prepare for the CCNA 200-301 certification with four practice exams that include 400+ unique review questions. …