CHAPTER 11Local Network Security in the Real World

The following challenges provide you with contextual reference points for the concepts you will learn in Part III. Because you have not yet read the chapters in Part III, the challenges in this chapter are designed to introduce you to the local host scenarios you’ll face in the real world. In this chapter, you’ll learn to:

  • Apply applicable Categories and Subcategories of the NIST Cyber Security Framework’s Identify function to a specific scenario to document the network’s assets and their possible vulnerabilities.
  • Use applicable Categories and Subcategories of the Protect function to generate specific policies and actions that can be used to secure the network’s assets for the specified ...

Get Cybersecurity Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.