Section 2: Principles of Security Monitoring

This section is designed to take the reader through intermediate topics such as the components of a Security Operations Center (SOC) and its functions, various data types on a network, how data can change as it passes through networking devices and technologies, various modern cyber threats and attacks, and cryptography.

This section contains the following chapters:

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.216.163