CHAPTER 10Endpoint Security and Analysis

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

  • What are some methods of mitigating malware?

  • What are the contents of host-based IPS/IDS log entries?

  • How do you use a public service to generate a malware analysis report?

  • How do you classify endpoint vulnerability assessment information?

  • What is the value of network and server profiling?

  • How do you classify CVSS reports?

  • What are the compliance frameworks and reporting methods?

  • How are secure device management techniques used to protect data and assets?

  • How are information security management systems used to protect assets?

Key Terms

This chapter uses the following key terms. You can find the definitions ...

Get CCNA Cybersecurity Operations Companion Guide, First Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.