Cisco Certified CyberOps Associate (200-201) Cert Prep: 2 Security Monitoring
Updated: 12/2024
Duration: 2h 29m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 478 MB
Genre: eLearning | Language: English
Updated: 12/2024
Duration: 2h 29m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 478 MB
Genre: eLearning | Language: English
In this course, instructor Lisa Bock describes the various attacks that can occur on the network, along with ways malicious actors use methods such as tunneling and encryption to conceal their behavior. Learn how to recognize the importance of having application visibility and control to effectively monitor the network. Lisa shows you how to examine system data from tcpdump and NetFlow to help with analysis. Discover ways to limit data visibility from threat actors on the network, by using access control lists and network address translation. She then outlines how to assure trust on the network by using the Public Key Infrastructure (PKI). Finally, see how a trusted third party uses certificates to securely exchange session keys to all parties in a transaction. Along the way, Lisa provides practical challenges that let you put your new knowledge to the test.
More Info