Book description
NoneTable of contents
- About This E-Book
- Title Page
- Copyright Page
- About the Authors
- About the Technical Reviewers
- Dedications
- Acknowledgments
- Command Syntax Conventions
- Introduction
-
Part I. Threat Analysis and Computer Forensics
- Chapter 1. Threat Analysis
- Chapter 2. Forensics
-
Part II. Network Intrusion Analysis
- Chapter 3. Fundamentals of Intrusion Analysis
- Chapter 4. NetFlow for Cybersecurity
-
Part III. Incident Response
-
Chapter 5. Introduction to Incident Response and the Incident Handling Process
- “Do I Know This Already?” Quiz
- Foundation Topics
- The Incident Response Plan
- The Incident Response Process
- Information Sharing and Coordination
- Incident Response Team Structure
- The Vocabulary for Event Recording and Incident Sharing (VERIS)
- Exam Preparation Tasks
- Complete Tables and Lists from Memory
- Define Key Terms
- Q&A
-
Chapter 6. Incident Response Teams
- “Do I Know This Already?” Quiz
- Foundation Topics
- Product Security Incident Response Teams (PSIRTs)
- National CSIRTs and Computer Emergency Response Teams (CERTs)
- Coordination Centers
- Incident Response Providers and Managed Security Service Providers (MSSPs)
- Exam Preparation Tasks
- Define Key Terms
- Q&A
- Chapter 7. Compliance Frameworks
- Chapter 8. Network and Host Profiling
-
Chapter 5. Introduction to Incident Response and the Incident Handling Process
-
Part IV. Data and Event Analysis
-
Chapter 9. The Art of Data and Event Analysis
- “Do I Know This Already?” Quiz
- Foundation Topics
- Using the 5-Tuple Correlation to Respond to Security Incidents
- Retrospective Analysis and Identifying Malicious Files
- Mapping Threat Intelligence with DNS and Other Artifacts
- Deterministic Versus Probabilistic Analysis
- Exam Preparation Tasks
- Complete Tables and Lists from Memory
- Define Key Terms
- Q&A
-
Chapter 9. The Art of Data and Event Analysis
- Part V. Incident Handling
- Part VI. Final Preparation
- Part VII. Appendix
- Inside Front Cover
- Inside Back Cover
- Where are the companion content files?
- Where are the companion content files?
- Access Card
- Code Snippets
Product information
- Title: CCNA Cyber Ops SECOPS 210-255 Official Cert Guide
- Author(s):
- Release date:
- Publisher(s): Cisco Press
- ISBN: None
You might also like
book
CCNA Cyber Ops SECFND #210-250 Official Cert Guide
CCNA Cyber Ops SECFND 210-250 Official Cert Guide from Cisco Press allows you to succeed on …
video
CCNA Cyber Ops SECFND 210-250
9+ Hours of Video Instruction Overview More than nine hours of video instruction on configuration and …
video
CCNA Cyber Ops SECOPS 210-255
Overview More than nine hours of video instruction on configuration and troubleshooting tasks to prepare you …
book
Cisco Certified CyberOps Associate 200-201 Certification Guide
Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associate 200-201 certification Key …