Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036
Cover for STUDY GUIDE 300-220 CBRTHD Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity

STUDY GUIDE 300-220 CBRTHD Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity

Sprog
Engelsk
Format
Kategori

Fakta

This book provides a comprehensive, practical guide to modern threat hunting techniques using Cisco’s cutting-edge security solutions. It delves into the critical components of network security analysis, emphasizing proactive threat detection rather than reactive response. Readers will gain in-depth knowledge of Cisco Secure Network Analytics (formerly Stealthwatch), exploring flow collection, entity modeling, and behavioral analytics to detect anomalies and hidden threats within network traffic.

The guide further examines DNS and email threat detection through Cisco Umbrella and Secure Email, highlighting DNS-layer security, phishing detection, and email-based threat hunting scenarios. It also covers firewall and intrusion prevention strategies with Cisco Secure Firewall (FTD) and IDS/IPS technologies, including how to analyze intrusion events and leverage Firepower Management Center for centralized threat management.

Manual threat hunting methods are thoroughly explored, teaching readers hypothesis-driven hunting, use of SIEM logs, endpoint telemetry, and advanced techniques such as pivoting and timeline analysis. The book also introduces automation fundamentals and orchestration with Cisco SecureX, demonstrating how to integrate third-party tools and build effective playbooks for incident response.

Case studies and simulated hunts illustrate real-world applications of the discussed concepts, enhancing understanding through practical examples. This book equips security professionals, analysts, and threat hunters with the tools and methodologies necessary to detect, analyze, and respond to sophisticated cyber threats effectively, thereby strengthening an organization’s security posture in an increasingly complex threat landscape.

© 2025 PublishDrive (E-bog): 6610000956661

Udgivelsesdato

E-bog: 22. maj 2025

Tags

    Vælg dit abonnement

    • Over 1 million titler

    • Download og nyd titler offline

    • Eksklusive titler + Mofibo Originals

    • Børnevenligt miljø (Kids Mode)

    • Det er nemt at opsige når som helst

    Den mest populære

    Premium

    For dig som lytter og læser ofte.

    129 kr. /måned

    7 dage gratis
    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis

    Unlimited

    For dig som lytter og læser ubegrænset.

    159 kr. /måned

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis

    Family

    For dig som ønsker at dele historier med familien.

    Fra 179 kr. /måned

    7 dage gratis
    • Fri lytning til podcasts

    • Kun 39 kr. pr. ekstra konto

    • Ingen binding

    Dig + 1 familiemedlem2 konti

    179 kr. /måned

    Start tilbuddet

    Flex

    For dig som vil prøve Mofibo.

    89 kr. /måned

    7 dage gratis
    • Gem op til 100 ubrugte timer

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis