From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 2 Security Monitoring

Active security monitoring

- [Lisa] Did you know that it only takes 47 seconds for a malicious actor to take advantage of a vulnerability? It's true. In this course, we'll cover the importance of actively monitoring the network. We'll review common attacks and see how to use system data to help with analysis. We'll identify ways we limit data visibility on the network by using access control lists and network address translation. We'll then summarize ways malicious actors use various methods, such as tunneling and encryption, to conceal their behavior. Hello, my name is Lisa Bock, and I'm a security ambassador. Are you ready to lock down your organization? Then let's get started.

Contents