Dengarkan dan baca

Masuki dunia cerita tanpa batas

  • Baca dan dengarkan sebanyak yang Anda mau
  • Lebih dari 1 juta judul
  • Judul eksklusif + Storytel Original
  • Uji coba gratis 14 hari, lalu €9,99/bulan
  • Mudah untuk membatalkan kapan saja
Coba gratis
Details page - Device banner - 894x1036
Cover for STUDY GUIDE 300-220 CBRTHD Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity

STUDY GUIDE 300-220 CBRTHD Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity

Bahasa
Inggris
Format
Kategori

Non Fiksi

This book provides a comprehensive, practical guide to modern threat hunting techniques using Cisco’s cutting-edge security solutions. It delves into the critical components of network security analysis, emphasizing proactive threat detection rather than reactive response. Readers will gain in-depth knowledge of Cisco Secure Network Analytics (formerly Stealthwatch), exploring flow collection, entity modeling, and behavioral analytics to detect anomalies and hidden threats within network traffic.

The guide further examines DNS and email threat detection through Cisco Umbrella and Secure Email, highlighting DNS-layer security, phishing detection, and email-based threat hunting scenarios. It also covers firewall and intrusion prevention strategies with Cisco Secure Firewall (FTD) and IDS/IPS technologies, including how to analyze intrusion events and leverage Firepower Management Center for centralized threat management.

Manual threat hunting methods are thoroughly explored, teaching readers hypothesis-driven hunting, use of SIEM logs, endpoint telemetry, and advanced techniques such as pivoting and timeline analysis. The book also introduces automation fundamentals and orchestration with Cisco SecureX, demonstrating how to integrate third-party tools and build effective playbooks for incident response.

Case studies and simulated hunts illustrate real-world applications of the discussed concepts, enhancing understanding through practical examples. This book equips security professionals, analysts, and threat hunters with the tools and methodologies necessary to detect, analyze, and respond to sophisticated cyber threats effectively, thereby strengthening an organization’s security posture in an increasingly complex threat landscape.

© 2025 PublishDrive (Ebook): 6610000956661

Tanggal rilis

Ebook: 22 Mei 2025

Tag

    Yang lain juga menikmati...

    Selalu dengan Storytel

    • Lebih dari 900.000 judul

    • Mode Anak (lingkungan aman untuk anak)

    • Unduh buku untuk akses offline

    • Batalkan kapan saja

    Terpopuler

    Premium

    Bagi yang ingin mendengarkan dan membaca tanpa batas.

    Rp39000 /bulan
    7 hari gratis
    • 1 akun

    • Akses Tanpa Batas

    • Akses bulanan tanpa batas

    • Batalkan kapan saja

    • Judul dalam bahasa Inggris dan Indonesia

    Coba sekarang

    Premium 6 bulan

    Bagi yang ingin mendengarkan dan membaca tanpa batas

    Rp189000 /6 bulan
    7 hari gratis
    Hemat 19%
    • 1 akun

    • Akses Tanpa Batas

    • Akses bulanan tanpa batas

    • Batalkan kapan saja

    • Judul dalam bahasa Inggris dan Indonesia

    Coba sekarang

    Local

    Bagi yang hanya ingin mendengarkan dan membaca dalam bahasa lokal.

    Rp19900 /bulan
    7 hari gratis
    • 1 akun

    • Akses Tanpa Batas

    • Akses tidak terbatas

    • Batalkan kapan saja

    • Judul dalam bahasa Indonesia

    Coba sekarang

    Local 6 bulan

    Bagi yang hanya ingin mendengarkan dan membaca dalam bahasa lokal.

    Rp89000 /6 bulan
    7 hari gratis
    Hemat 25%
    • 1 akun

    • Akses Tanpa Batas

    • Akses tidak terbatas

    • Batalkan kapan saja

    • Judul dalam bahasa Indonesia

    Coba sekarang