O'Reilly logo

CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) by Earl Carter

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 18. Cisco Threat Response

Upon completion of this chapter, you will be able to perform the following tasks:

  • Understand the benefits of Cisco Threat Response (CTR)

  • Identify the CTR predefined policy types

  • Understand the CTR user interface

  • Identify the CTR investigation levels

  • Identify the IDS devices supported by CTR

  • Understand the CTR terminology

The increasingly complex security threats that your network faces make it critical that you maintain a high level of intrusion protection on your network. Wasting resources investigating false alarms can detract from legitimate threats against your network. Cisco Threat Response is another component in the overall Cisco intrusion protection solution. It works in concert with other IDS components to virtually ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required