Chapter 1 Cybersecurity and the Security Operations Center
Chapter 2 Windows Operating System
Chapter 3 Linux Operating System
Chapter 4 Network Protocols and Services
Chapter 5 Network Infrastructure
Chapter 6 Principles of Network Security
Chapter 7 Network Attacks: A Deeper Look
Chapter 8 Protecting the Network
Chapter 9 Cryptography and the Public Key Infrastructure
Chapter 10 Endpoint Security and Analysis
Chapter 11 Security Monitoring
Chapter 12 Intrusion Data Analysis
Chapter 13 Incident Response and Handling
Appendix A Answers to the “Check Your Understanding” Questions
52.14.130.13