From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Comparing security deployments
From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts
Comparing security deployments
- [Instructor] While no defense method is totally threat proof, good practices will help hamper a potential attack. Most experts generally suggest using a layered approach that includes network, endpoint, and application security systems. Defense methods include a combination of logical and physical security, security appliances along with policies that outline proper behavior. Logical security includes access control techniques that ensure authentication, authorization and accounting in an information system. Physical security methods limit access to buildings and equipment by using physical controls, such as locks, lighting, gates and smart cards. Security appliances include intrusion detection, intrusion prevention systems, gateways, and firewalls that are tuned to allow or deny traffic based on a set of rules. And policies define a set of rules of conduct for anyone or anything that interacts with system resources.…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Identifying challenges of data visibility2m 25s
-
(Locked)
Comparing security deployments2m 37s
-
(Locked)
Using agentless or agent-based methods2m 54s
-
(Locked)
Utilizing SIEM, SOAR, and log management3m 12s
-
(Locked)
Employing runbook automation3m 53s
-
(Locked)
Exploring Nmap4m 12s
-
(Locked)
Challenge: Using Nmap2m 57s
-
(Locked)
Solution: Using Nmap5m 29s
-
(Locked)
-