Cisco Certified CyberOps Associate 200-201 certification guide learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents / Glen D. Singh.
Material type: TextPublisher: Birmingham : Packt Publishing, ©2021Description: xvii, 635 pages, illustrations, 24 cmISBN: 9781800560871 (paperback)Subject(s): Computer security -- Examinations -- Study guides | Electronic data processing personnel -- Certification -- Study guidesLOC classification: TK5105.59 | .G54 2021 c.1Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
General Circulation | APU Library Open Shelf | Book | TK5105.59 .G54 2021 c.1 (Browse shelf (Opens below)) | 1 | Available | 00013119 |
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
TK5105.59 .G36 2012 c.2 Network and application security fundamentals and practices / | TK5105.59 .G37 2021 c.1 Zero Trust security : an enterprise guide / | TK5105.59 .G46 2010 c.1 Network intrusion detection and prevention : | TK5105.59 .G54 2021 c.1 Cisco Certified CyberOps Associate 200-201 certification guide learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents / | TK5105.59 .G85 2017 c.1 Cybersecurity : | TK5105.59 .G85 2017 c.2 Cybersecurity : | TK5105.59 .H34 2002 c.1 Harley Hahn's Internet insecurity : |
Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface --
Section 1: Exploring Networking Concepts
Exploring Network Components and Security Systems
Discovering Security Concepts
Section 2:
Understanding Security Principles
Identifying Attack Methods
Working with Cryptography and PKI
Section 3:
Delving into Endpoint Threat Analysis
Interpreting Endpoint Security
Exploring Computer Forensics
Performing Intrusion Analysis
Section 4:
Security Management Techniques
Dealing with Incident Response
Implementing Incident Handling
Implementing Cisco Security Solutions
Working with Cisco Security Solutions
Real-World Implementation and Best Practices
Mock Exam 1
Mock Exam 2
There are no comments on this title.