Skip to Main Content
Cybersecurity Essentials
book

Cybersecurity Essentials

by Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short
October 2018
Beginner content levelBeginner
784 pages
17h 34m
English
Sybex
Content preview from Cybersecurity Essentials

CHAPTER 6Local Host Security in the Real World

The following challenges provide contextual reference points for the concepts you will learn in Part II. Because you have not yet read the chapters in Part II, the challenges in this chapter are designed to introduce you to the local host scenarios you’ll face in the real world.

In this chapter, you’ll learn to:

  1. Apply applicable categories and sub-categories of the NIST Cyber Security Framework’s “Identify” function to a specific scenario to document the network’s assets and their possible vulnerabilities.
  2. Use applicable categories and sub-categories of the “Protect” function to generate specific policies and actions that can be used to secure the network’s assets for the specified scenario. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cybersecurity – Attack and Defense Strategies - Second Edition

Cybersecurity – Attack and Defense Strategies - Second Edition

Yuri Diogenes, Dr. Erdal Ozkaya
Security in Computing

Security in Computing

Shari Lawrence Pfleeger, Charles P. Pfleeger, Jonathan Margulies

Publisher Resources

ISBN: 9781119362395Purchase book