Custom cover image
Custom cover image

Building a secure infrastructure : the key procedures for system network security / Rajkumar Banoth, Aruna Kranthi Godishala

By: Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: Cham : Springer, [2025]Copyright date: © 2025Description: 1 Online-Ressource (xlii, 626 Seiten) : IllustrationenISBN:
  • 9783032064394
Subject(s): Additional physical formats: 9783032064387 | 9783032064400 | Erscheint auch als: 9783032064387 Druck-Ausgabe | Erscheint auch als: 9783032064400 Druck-AusgabeDDC classification:
  • 005.8 23
DOI: DOI: 10.1007/978-3-032-06439-4Online resources: Summary: Chapter 1: The Danger & Fighters in the War Against Cybercrime -- Chapter 2: The Windows Operating System, Linux Overview -- Chapter 3: Network Protocols, Ethernet and IP Protocol, Connectivity Verification, Address Resolution Protocol -- Chapter 4: The Transport Layer, Network Services, Network Communication Devices -- Chapter 5: Network Security Infrastructure, Attackers and Their Tools, Common Threats and Attacks Network Monitoring and Tools -- Chapter 6: Attacking the Foundation, Attacking What We Do, Understanding Defense -- Chapter 7: Access Control, Threat Intelligence -- Chapter 8: Public Key Cryptography, Endpoint Protection, Endpoint Vulnerability Assessment -- Chapter 9: Technologies and Protocols, Network Security Data -- Chapter 10: Evaluating Alerts, Working with Network Security Data, Incident Response Models.Summary: This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center. It provides basic knowledge vital for grasping enterprise security operations and threat mitigation. This book clarifies the duties of the Cybersecurity Operations Analyst inside a company as well as the required qualities and features of the Windows Operating System that support efficient cybersecurity investigations. The authors also investigates the operation and structure of network infrastructure, categorizing the different types of network attacks, and looking at the functionality of important network protocols and services. This book outlines methods to stop illegal access to data, hosts, and computer networks; looks at how cryptography affects network security monitoring; and investigates how network monitoring tools can identify attacks on network protocols and services, so promoting a thorough knowledge of proactive and reactive security strategies. The authors discuss the approaches for investigating attacks and endpoint vulnerabilities as well as the process for evaluating network security alerts. It provides readers the analytical tools they need to find, assess, and react to threats directed at endpoint devices. Examining network intrusion data to find compromised hosts and vulnerabilities, this book presents the use of incident response frameworks to control and supervise network security events. It also illustrates how to use virtual computers to generate safe environments for the execution and examination of cybersecurity threat scenarios, so facilitating hands-on, practical interaction with contemporary defense tactics. This book targets IT professionals who want to pursue a career in the Security Operation Center (SOC). Engineers working within Software Design and Development as well as Cyber Security operations and Cyber Physical System domain will want to purchase this book. It’s also designed for Cisco Networking Academy® students, who are seeking career oriented, entry-level security analyst skills.PPN: PPN: 1947800094Package identifier: Produktsigel: ZDB-2-SEB | ZDB-2-CWD | ZDB-2-SXPC
No physical items for this record

Barrierefreier Inhalt: PDF/UA-1. Table of contents navigation. Single logical reading order. Short alternative textual descriptions. Use of color is not sole means of conveying information. Use of high contrast between text and background color. Next / Previous structural navigation. All non-decorative content supports reading without sight

Anmerkungen zur Barrierefreiheit: This PDF has been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com. Please note that a more accessible version of this eBook is available as ePub.. No reading system accessibility options actively disabled. Publisher contact for further accessibility information: accessibilitysupport@springernature.com