This section is designed to take the reader through intermediate topics such as the components of a Security Operations Center (SOC) and its functions, various data types on a network, how data can change as it passes through networking devices and technologies, various modern cyber threats and attacks, and cryptography.
This section contains the following chapters:
18.191.216.163