Catalog Search Results
Author
Pub. Date
2021.
Language
English
Description
Cybersecurity specialists are in high demand. This course prepares you to fill these roles as it covers the Security Concepts portion of the Cisco CBROPS exam.
In this course, instructor Lisa Bock helps you prepare for the Cisco CBROPS exam. Lisa covers the principles of a defense-in-depth strategy, to ensure the confidentiality, availability, and integrity of a system. Lisa outlines today’s threats and threat actors, and explores the relationship...
Author
Pub. Date
2021.
Language
English
Description
Explore the principles of defense in depth as you prepare for the Host-Based Analysis portion of the Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Cybersecurity specialists and related occupations are in high demand. In this course, instructor Lisa Bock helps you prepare for the host-based analysis portion of the Cisco CyberOps exam. Lisa begins by summarizing key components in a Windows OS. She then walks you through the architecture,...
Author
Pub. Date
2021.
Language
English
Description
Cybersecurity specialists are in high demand. This course prepares you to fill these roles as it covers the Network Intrusion Analysis portion of the Cisco CBROPS exam.
Cybersecurity specialists and related positions are some of the most in-demand security positions today, and the Cisco CBROPS exam is a big part of proving your skills for any cybersecurity job. In this course, Lisa Bock helps you prepare for the exam, covering the network intrusion...
Author
Pub. Date
2018.
Language
English
Description
Learn to use Wireshark for deep packet analysis, capturing, and forensics. Learn to detect and handle unusual traffic on a network and prevent malicious activity.
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively...
Author
Pub. Date
2017.
Language
English
Description
Get an overview of Voice over IP (VoIP) and unified communications, including terminals, applications, codecs, gateways, real-time protocols, and network operations.
Today, when you make a call, you are most likely using Voice over IP (VoIP). VoIP uses the existing internet and network to transfer and route voice traffic in IP packets. In many cases, it is a part of a Unified Communications (UC) system, which integrates VoIP, video, email, and instant...
Author
Pub. Date
2021.
Language
English
Description
Explore the principles of defense in depth as you prepare for the Security Monitoring portion of the Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
In this course, instructor Lisa Bock describes the various attacks that can occur on the network, along with ways malicious actors use methods such as tunneling and encryption to conceal their behavior. Learn how to recognize the importance of having application visibility and control to effectively...
Author
Pub. Date
2019.
Language
English
Description
Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
In order to assess—and ultimately, decrease—an organization's risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you're working to strengthen network security at your organization, it's essential to have a solid grasp of the processes, methodologies,...
Author
Pub. Date
2018.
Language
English
Description
Learn how to secure Cisco routers and switches, mitigate Layer 3 and Layer 2 attacks, and secure a VLAN.
A malicious person that gains access to a switch or router can modify system integrity to steal information or disrupt communications. Qualified network administrators should know how to prevent attacks by securing networking devices. This course covers secure routing and switching, including mitigation procedures and VLAN switching. Lisa Bock,...
Author
Pub. Date
2018.
Language
English
Description
Get an overview of packet analysis and using Wireshark Next Generation, a free network protocol analyzer. Find out how it can help with latency issues and network attacks.
Are you interested in learning about packet analysis, or understanding and identifying the traffic on your network? This course gives you a solid overview of deep packet inspection via Wireshark Next Generation. Instructor Lisa Bock helps you navigate the many features of Wireshark....
Author
Pub. Date
2016.
Language
English
Description
Prevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.
Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated....
Author
Pub. Date
2017.
Language
English
Description
Learn about Cisco network management, secure device access, and protocols such as NTP, SCP, and SNMP.
Administering a network means controlling access to network resources: granting, limiting, preventing, and revoking permissions as necessary. This course covers the topic of secure access, including in-band and out-of-band management, secure device access, and protocols such as NTP, SCP, and SNMP. Security ambassador Lisa Bock introduces the three...
Author
Pub. Date
2018.
Language
English
Description
Enhance your Wireshark workflow by becoming better acquainted with its interface and core features. Discover the different menus and toolbars and how to personalize the interface.
Speed up your workflow and enhance your analysis by becoming better acquainted with the Wireshark interface and its core features. In this course, join Lisa Bock as she helps to familiarize you with this powerful protocol analysis tool. Lisa reviews the menu choices, explains...
Author
Pub. Date
2023.
Language
English
Description
Learn how the Internet of Things (IoT) has revolutionized our lives, and why it’s essential to mitigate risk by securing vulnerable IoT devices to avoid a devastating attack.
Join security ambassador Lisa Bock as she covers why it’s essential to consider security issues when designing and using IoT devices. Lisa reinforces the importance of testing for vulnerabilities before implementation, reviews key considerations for selecting and securing...
Author
Pub. Date
2018.
Language
English
Description
Review the fundamentals of intrusion detection and intrusion prevention systems (IDS/IPS), how they detect and mitigate common attacks, and the practical applications of IDS/IPS.
A network must be able to quickly recognize threats. Intrusion detection and intrusion prevention systems (IDS/IPS) provide organizations with a proactive approach to monitoring their network, enabling them to take action against possible threats. In this course, join security...
Author
Pub. Date
2021.
Language
English
Description
Explore the principles of defense in depth as you prepare for the security policies and procedures portion of the Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Cybersecurity specialists and related positions are some of the most in-demand security positions today, and the Cisco CBROPS exam is a big part of proving your skills for any cybersecurity job. In this course, Lisa Bock helps you prepare for the exam by starting with management...
Author
Pub. Date
2023.
Language
English
Description
Discover the many Internet of Things (IoT) devices that can pose a risk to our privacy, and how standards, regulations, and proper device selection can help ensure data privacy.
The Internet of Things (IoT) connects people, infrastructures, and things to improve our lives and enhance production of goods and services. The rapid expansion of IoT technology brings with it an array of exciting and imaginative ways to make our products smarter and our...
Author
Pub. Date
2017.
Language
English
Description
Review the essential terms and concepts you need to know to effectively secure Cisco networks.
Protect your network from common security threats. In this course, instructor Lisa Bock helps equip network administrators with a foundational understanding of security concepts in relationship to Cisco networks. Lisa covers essential security terms and discusses common security threats such as active and passive attacks, social engineering, and malware....
Author
Pub. Date
2022.
Language
English
Description
Learn how to secure an organization's network and keep your interconnected systems and data safe.
Want to keep your interconnected systems and data safe? In this course, Lisa Bock covers network security and securing an organization's infrastructure. Lisa introduces security devices such as firewalls and honeypots. In addition, she reviews the importance of isolating networks with VLANS and NAT addressing, along with a review of common security protocols....
Author
Pub. Date
2023.
Language
English
Description
Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.
Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting and reconnaissance—the process of gathering information about computers and the people to which they belong. In this course, Lisa...
Author
Pub. Date
2023.
Language
English
Description
Learn about ethical hacking, a desired skill for any IT security professional, with a focus on a Module 1, Introduction to Ethical Hacking, of the Certified Ethical Hacker (CEH) exam.
Ethical hacking tests the strength of an organization's defenses and is a desired skill for any IT professional. In this course, security expert Lisa Bock explains how to protect data in a digital world and covers the basics of Information security. She begins by discussing...
Didn't find it?
Can't find what you are looking for? Try our Purchase Suggestion Service. Submit Request