Cisco CyberOps Associate (200-201)

The course begins with a deep dive into the foundations of cybersecurity, exploring the CIA Triad and various security approaches. It lays the groundwork for understanding complex security tools and practices, differentiating key security concepts, and identifying risk management methods. As you pro...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Format: Elektronisch Video
Sprache:English
Veröffentlicht: [Place of publication not identified] Packt Publishing 2024
Ausgabe:[First edition].
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000ngm a22000002 4500
001 ZDB-30-ORH-100859496
003 DE-627-1
005 20240227122213.0
006 m o | |
007 cr uuu---uuuuu
008 240227s2024 xx ||| |o o ||eng c
020 |a 9781835889749  |c electronic video  |9 978-1-83588-974-9 
020 |a 1835889743  |c electronic video  |9 1-83588-974-3 
035 |a (DE-627-1)100859496 
035 |a (DE-599)KEP100859496 
035 |a (ORHE)9781835889749 
035 |a (DE-627-1)100859496 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23/eng/20240130 
245 1 0 |a Cisco CyberOps Associate (200-201) 
250 |a [First edition]. 
264 1 |a [Place of publication not identified]  |b Packt Publishing  |c 2024 
300 |a 1 online resource (1 video file (13 hr., 56 min.))  |b sound, color. 
336 |a zweidimensionales bewegtes Bild  |b tdi  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Online resource; title from title details screen (O'Reilly, viewed January 30, 2024) 
520 |a The course begins with a deep dive into the foundations of cybersecurity, exploring the CIA Triad and various security approaches. It lays the groundwork for understanding complex security tools and practices, differentiating key security concepts, and identifying risk management methods. As you progress, you'll explore the intricate world of cybersecurity, from understanding different types of threat actors to comparing various security deployments and access control models. The course focuses on enhancing your ability to tackle real-world challenges. You'll learn to identify data visibility challenges and use the 5-tuple approach to isolate hosts effectively. The curriculum covers a broad spectrum of content, including tcpdump and NetFlow analysis, firewall data interpretation, and mastering the complexities of application visibility and control. Each module is designed to reinforce your understanding of cybersecurity's most crucial aspects. The course wraps up by integrating all the concepts and skills you've learned. You'll delve into network attacks, web application attacks, and the nuances of social engineering. Additionally, you'll gain valuable insights into certificate components, endpoint-based attacks, and the intricacies of Windows 10 and Ubuntu systems. What you will learn Understand key cybersecurity concepts and tools Evaluate and compare security deployments Tackle data visibility and loss challenges Implement effective detection methodologies Analyze network and web application attacks Apply incident analysis and forensic techniques Audience This course is ideal for aspiring cybersecurity professionals and IT staff. Perfect for those seeking foundational skills in cybersecurity and network threat analysis, aligned with Cisco standards. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. 
650 0 |a Computer security  |v Study guides  |x Examinations 
650 0 |a Electronic data processing personnel  |v Study guides  |x Certification 
650 4 |a Sécurité informatique ; Examens ; Guides de l'étudiant 
650 4 |a Instructional films 
650 4 |a Nonfiction films 
650 4 |a Internet videos 
650 4 |a Films de formation 
650 4 |a Films autres que de fiction 
650 4 |a Vidéos sur Internet 
700 1 |a Sequeira, Anthony  |e PräsentatorIn  |4 pre 
700 1 |a Wong, Ronnie  |e PräsentatorIn  |4 pre 
710 2 |a ACI Learning,  |e PräsentatorIn  |4 pre 
710 2 |a Packt Publishing,  |e Verlag  |4 pbl 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781835889749/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
935 |c vide 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-100859496
_version_ 1818767372666798080
adam_text
any_adam_object
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)100859496
(DE-599)KEP100859496
(ORHE)9781835889749
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition [First edition].
format Electronic
Video
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05412ngm a22005172 4500</leader><controlfield tag="001">ZDB-30-ORH-100859496</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240227122213.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240227s2024 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781835889749</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-1-83588-974-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1835889743</subfield><subfield code="c">electronic video</subfield><subfield code="9">1-83588-974-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100859496</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP100859496</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781835889749</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100859496</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240130</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cisco CyberOps Associate (200-201)</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 video file (13 hr., 56 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The course begins with a deep dive into the foundations of cybersecurity, exploring the CIA Triad and various security approaches. It lays the groundwork for understanding complex security tools and practices, differentiating key security concepts, and identifying risk management methods. As you progress, you'll explore the intricate world of cybersecurity, from understanding different types of threat actors to comparing various security deployments and access control models. The course focuses on enhancing your ability to tackle real-world challenges. You'll learn to identify data visibility challenges and use the 5-tuple approach to isolate hosts effectively. The curriculum covers a broad spectrum of content, including tcpdump and NetFlow analysis, firewall data interpretation, and mastering the complexities of application visibility and control. Each module is designed to reinforce your understanding of cybersecurity's most crucial aspects. The course wraps up by integrating all the concepts and skills you've learned. You'll delve into network attacks, web application attacks, and the nuances of social engineering. Additionally, you'll gain valuable insights into certificate components, endpoint-based attacks, and the intricacies of Windows 10 and Ubuntu systems. What you will learn Understand key cybersecurity concepts and tools Evaluate and compare security deployments Tackle data visibility and loss challenges Implement effective detection methodologies Analyze network and web application attacks Apply incident analysis and forensic techniques Audience This course is ideal for aspiring cybersecurity professionals and IT staff. Perfect for those seeking foundational skills in cybersecurity and network threat analysis, aligned with Cisco standards. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&amp;S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Study guides</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing personnel</subfield><subfield code="v">Study guides</subfield><subfield code="x">Certification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sequeira, Anthony</subfield><subfield code="e">PräsentatorIn</subfield><subfield code="4">pre</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wong, Ronnie</subfield><subfield code="e">PräsentatorIn</subfield><subfield code="4">pre</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACI Learning,</subfield><subfield code="e">PräsentatorIn</subfield><subfield code="4">pre</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Packt Publishing,</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781835889749/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-100859496
illustrated Not Illustrated
indexdate 2024-12-18T08:48:50Z
institution BVB
isbn 9781835889749
1835889743
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 video file (13 hr., 56 min.)) sound, color.
psigel ZDB-30-ORH
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher Packt Publishing
record_format marc
spelling Cisco CyberOps Associate (200-201)
[First edition].
[Place of publication not identified] Packt Publishing 2024
1 online resource (1 video file (13 hr., 56 min.)) sound, color.
zweidimensionales bewegtes Bild tdi rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
The course begins with a deep dive into the foundations of cybersecurity, exploring the CIA Triad and various security approaches. It lays the groundwork for understanding complex security tools and practices, differentiating key security concepts, and identifying risk management methods. As you progress, you'll explore the intricate world of cybersecurity, from understanding different types of threat actors to comparing various security deployments and access control models. The course focuses on enhancing your ability to tackle real-world challenges. You'll learn to identify data visibility challenges and use the 5-tuple approach to isolate hosts effectively. The curriculum covers a broad spectrum of content, including tcpdump and NetFlow analysis, firewall data interpretation, and mastering the complexities of application visibility and control. Each module is designed to reinforce your understanding of cybersecurity's most crucial aspects. The course wraps up by integrating all the concepts and skills you've learned. You'll delve into network attacks, web application attacks, and the nuances of social engineering. Additionally, you'll gain valuable insights into certificate components, endpoint-based attacks, and the intricacies of Windows 10 and Ubuntu systems. What you will learn Understand key cybersecurity concepts and tools Evaluate and compare security deployments Tackle data visibility and loss challenges Implement effective detection methodologies Analyze network and web application attacks Apply incident analysis and forensic techniques Audience This course is ideal for aspiring cybersecurity professionals and IT staff. Perfect for those seeking foundational skills in cybersecurity and network threat analysis, aligned with Cisco standards. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
Computer security Study guides Examinations
Electronic data processing personnel Study guides Certification
Sécurité informatique ; Examens ; Guides de l'étudiant
Instructional films
Nonfiction films
Internet videos
Films de formation
Films autres que de fiction
Vidéos sur Internet
Sequeira, Anthony PräsentatorIn pre
Wong, Ronnie PräsentatorIn pre
ACI Learning, PräsentatorIn pre
Packt Publishing, Verlag pbl
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781835889749/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Cisco CyberOps Associate (200-201)
Computer security Study guides Examinations
Electronic data processing personnel Study guides Certification
Sécurité informatique ; Examens ; Guides de l'étudiant
Instructional films
Nonfiction films
Internet videos
Films de formation
Films autres que de fiction
Vidéos sur Internet
title Cisco CyberOps Associate (200-201)
title_auth Cisco CyberOps Associate (200-201)
title_exact_search Cisco CyberOps Associate (200-201)
title_full Cisco CyberOps Associate (200-201)
title_fullStr Cisco CyberOps Associate (200-201)
title_full_unstemmed Cisco CyberOps Associate (200-201)
title_short Cisco CyberOps Associate (200-201)
title_sort cisco cyberops associate 200 201
topic Computer security Study guides Examinations
Electronic data processing personnel Study guides Certification
Sécurité informatique ; Examens ; Guides de l'étudiant
Instructional films
Nonfiction films
Internet videos
Films de formation
Films autres que de fiction
Vidéos sur Internet
topic_facet Computer security Study guides Examinations
Electronic data processing personnel Study guides Certification
Sécurité informatique ; Examens ; Guides de l'étudiant
Instructional films
Nonfiction films
Internet videos
Films de formation
Films autres que de fiction
Vidéos sur Internet
url https://learning.oreilly.com/library/view/-/9781835889749/?ar
work_keys_str_mv AT sequeiraanthony ciscocyberopsassociate200201
AT wongronnie ciscocyberopsassociate200201
AT acilearning ciscocyberopsassociate200201
AT packtpublishing ciscocyberopsassociate200201