O'Reilly logo

Implementing Cisco Networking Solutions by Harpreet Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing services

The attacks in a modern-day world go far beyond layer 3 and layer 4. We see new protocols being used and the frequently used protocols being used in ingenious ways to attack. As an example, a malware may be sent to the internal users of an organization through an email, which cannot be detected by the firewall. Therefore, it is important to start looking far deeper into the packets as they traverse the network.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required