Omar Santos - Böcker
1 016 kr
Tillfälligt slut
510 kr
Kommande
SaaS Fundamentals: A Guide to Modern Cloud Solutions
SaaS Fundamentals is a clear, straightforward introduction to Software as a Service that blends foundational technical knowledge with real-world application. This guide helps you confidently evaluate, migrate, and navigate the intricacies of SaaS while highlighting proven solutions.
Modern organizations depend on SaaS for collaboration, networking, visibility, and security. This book explains how SaaS differs from traditional software, why it accelerates innovation, and how to assess SaaS offerings for business value, reliability, security, and cost. You’ll learn how SaaS works in practice through established enterprise examples, including Cisco Umbrella, Cisco Webex, and Cisco ThousandEyes, demonstrating how cloud-managed networking, digital experience monitoring, and hybrid operations fit into modern IT environments.
Designed for busy professionals, each chapter stands alone, making it easy to reference architectures, migration planning, best practices, and detailed overviews of trusted SaaS solutions. The focus is practical, jargon-free, and directly applicable on the job.
Whether you’re moving from on-premises systems or refining an existing cloud strategy, this book helps you reduce risk, simplify operations, and improve agility with SaaS.
What You Will Learn
How SaaS works and how it differs from traditional software models How to evaluate SaaS for business value, security, compliance, and reliability How to plan and support SaaS migrations with minimal disruption How SaaS is used in real enterprises with Cisco Webex, Cisco ThousandEyes, and Cisco Umbrella Key SaaS operational concepts, including identity, integration, monitoring, and governance Emerging trends such as AI-assisted SaaS, hybrid multicloud, and edge integration276 kr
Skickas inom 7-10 vardagar
Use AI to Predict, Prevent, and Protect Against the Next Cyber Attack
From cybersecurity leader Omar Santos and AI expert Dr. Petar Radanliev comes a groundbreaking guide to the future of cyber defense. This book is a practical guide to building intelligent, AI-powered cyber defenses in today’s fast-evolving threat landscape. With cyber threats growing in speed, scale, and sophistication, traditional defenses can no longer keep up. This essential book shows how to use AI technologies to detect threats earlier, respond faster and build stronger digital resilience.
Designed for IT professionals, security analysts, engineers, executives, academics, and students, this guide bridges the gap between advanced AI technologies and real-world cybersecurity strategies. Whether you are managing enterprise networks, leading a security team, or preparing for a career in digital defense, this book will help you use AI to protect your most valuable assets.
As ransomware attacks, data breaches, and zero-day exploits rise, organizations must move from reactive defense to proactive resilience. This book explains how technologies such as generative AI, large language models (LLMs), and small language models (SLMs) enable real-time threat detection, automated incident response, and predictive threat analysis.
This book delivers:
Clear explanations of AI technologies such as large language models (LLMs), generative AI, and behavior-based analytics. Hands-on strategies for leveraging AI to boost detection, response, recovery, and resilience. Case studies and practical tools to help you apply cutting-edge defense methods in real-world environments.By reading AI-Powered Digital Cyber Resilience, you will:
Understand the fundamentals of digital cyber resilience in an AI-driven world and why traditional security methods are no longer enough. Gain deep insight into generative AI, large language models (LLMs), small language models (SLMs), and how they are transforming cybersecurity. Apply AI-based techniques for real-time threat detection, anomaly detection, and predictive threat forecasting. Implement AI-driven incident response strategies, including automated orchestration and real-time decision-making. Secure IoT devices and cloud infrastructures using machine learning, behavioral analytics, and AI-powered access control. Use advanced encryption, data privacy tools, and compliance frameworks powered by intelligent automation. Build and enhance cybersecurity programs and policies with AI integration for better governance and risk management. Ensure secure and ethical AI deployments, including continuous model updates and protection against adversarial attacks.Don’t wait for the next cyberattack. Take control with the knowledge and tools you need to build lasting digital resilience. AI-Powered Digital Cyber Resilience is your essential guide to navigating and mastering the future of cybersecurity.
348 kr
Kommande
Agentic AI for Cybersecurity: Building Autonomous Defenders and Adversaries
Unlock the power of next‑generation AI agents to transform cybersecurity, business operations, and productivity.
Agentic AI has transformed cybersecurity and other domains with autonomous, intelligent software agents that can plan, reason, and take action. Instead of simply answering questions, these agents work like digital analysts using tools and adapting to new information, while collaborating with humans and other agents to get real work done.
Agentic AI for Cybersecurity is a practical, hands‑on guide to building, deploying, and securing these systems. Written in plain English, the book explains how modern agentic AI frameworks (such as LangChain, LangGraph, CrewAI, and LlamaIndex) enable autonomous, multi‑agent systems, and how frameworks like Model Context Protocol (MCP) and agent‑to‑agent (A2A) are creating an emerging Internet of Agents.
Through step‑by‑step projects and real‑world case studies, readers learn how to apply agentic AI to cybersecurity defense, adversarial testing, business automation, and productivity workflows. The book also addresses critical risks, including adversarial threats, governance, and compliance. The goal is to make security a first‑class concern, not an afterthought.
Designed for both technical and non‑technical readers, this book bridges the gap between AI theory and real‑world impact.
Key Features
Hands‑on projects with practical examples for building and deploying AI agents Covers leading agentic AI frameworks and protocols (LangChain, CrewAI, LangGraph, MCP, A2A, n8n, OpenAI Agent Builder, and more) Security‑first approach with dedicated coverage of adversarial threats and governance Plain‑English explanations with diagrams, exercises, and GitHub resources
Who This Book Is For
Cybersecurity professionals, AI engineers, developers, architects, business and technology leaders, or anyone looking to understand and apply agentic AI responsibly and effectively.
411 kr
Skickas inom 7-10 vardagar
Cisco Cybersecurity Operations Fundamentals CBROPS 200-201 Official Cert Guide presents you with an organized test-preparation routine using proven series elements and techniques. Do I Know This Already? quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.
Stay ahead with the latest AI-driven Cisco Cybersecurity Operations Fundamentals exam updates (v1.2) and download your free digital supplement from the companion website by registering your product.
Master Cisco Cybersecurity Operations Fundamentals CBROPS 200-201 exam topics Assess your knowledge with chapter-opening quizzes Review key concepts with exam preparation tasks Practice with realistic exam questions in the practice test softwareCisco Cybersecurity Operations Fundamentals CBROPS 200-201 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Leading Cisco technology expert Omar Santos shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.
This complete study package includes
A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, with two full exams comprised of well-reviewed, exam-realistic questions, customization options, and detailed performance reports A video mentoring lesson from the authors Complete Video Course A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time485 kr
Tillfälligt slut
Trust the best-selling Cert Guide series from Pearson IT Certification to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.
CompTIA PenTest+ PT0-002 Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. Do I Know This Already? quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.
CompTIA PenTest+ PT0-002 Cert Guide focuses specifically on the objectives for the CompTIA PenTest+ PT0-002 exam. Leading security expert Omar Santos shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.
This complete study package includes
A test-preparation routine proven to help you pass the exams Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section Chapter-ending exercises, which help you drill on key concepts you must know thoroughly An online interactive Flash Cards application to help you drill on Key Terms by chapter A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study timeThe companion website contains the powerful Pearson Test Prep practice test software complete with two complete practice exams.
Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success.
This study guide helps you master all the topics on the CompTIA PenTest+ PT0-002 exam, including
Planning and Scoping a Penetration Testing Assessment Information Gathering and Vulnerability Identification Social Engineering Attacks and Physical Security Vulnerabilities Exploiting Wired and Wireless Networks Exploiting Application-Based Vulnerabilities Cloud, Mobile, and IoT Security Performing Post-Exploitation Techniques Reporting and Communication Tools and Code AnalysisIncludes Exclusive Offers For Up to 80% Off Practice Tests
Pearson Test Prep online system requirements:
Browsers: Chrome version 73 and above, Safari version 12 and above, Microsoft Edge 44 and above.
Devices: Desktop and laptop computers, tablets running on Android v8.0 and iOS v13, smartphones with a minimum screen size of 4.7”. Internet access required.
Pearson Test Prep offline system requirements:
Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases
Also available from Pearson IT Certification for CompTIA PenTest+ PT0-002 study is the CompTIA PenTest+ PT0-002 Cert Guide Premium Edition eBook and Practice Test. This digital-only certification preparation product combines an eBook with enhanced Pearson Test Prep Practice Tests.
This integrated learning package
Enables you to focus on individual topic areas or take complete, timed exams Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions Provides unique sets of exam-realistic practice questions Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most608 kr
Skickas inom 7-10 vardagar
ALL THE KNOWLEDGE YOU NEED TO BUILD CYBERSECURITY PROGRAMS AND POLICIES THAT WORK
Clearly presents best practices, governance frameworks, and key standards
Includes focused coverage of healthcare, finance, and PCI DSS compliance
An essential and invaluable guide for leaders, managers, and technical professionals
Today, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: Success requires everyone to work together, from leaders on down. Developing Cybersecurity Programs and Policies in an AI-Driven World offers start-to-finish guidance for establishing effective cybersecurity in any organization. Drawing on more than two decades of real-world experience, Omar Santos presents realistic best practices for defining policy and governance, ensuring compliance, and collaborating to harden the entire organization.
Santos begins by outlining the process of formulating actionable cybersecurity policies and creating a governance framework to support these policies. He then delves into various aspects of risk management, including strategies for asset management and data loss prevention, illustrating how to integrate various organizational functions—from HR to physical security—to enhance overall protection. This book covers many case studies and best practices for safeguarding communications, operations, and access; alongside strategies for the responsible acquisition, development, and maintenance of technology. It also discusses effective responses to security incidents. Santos provides a detailed examination of compliance requirements in different sectors and the NIST Cybersecurity Framework.
LEARN HOW TO
Establish cybersecurity policies and governance that serve your organization’s needs Integrate cybersecurity program components into a coherent framework for action Assess, prioritize, and manage security risk throughout the organization Manage assets and prevent data loss Work with HR to address human factors in cybersecurity Harden your facilities and physical environment Design effective policies for securing communications, operations, and access Strengthen security throughout AI-driven deployments Plan for quick, effective incident response and ensure business continuity Comply with rigorous regulations in finance and healthcare Learn about the NIST AI Risk Framework and how to protect AI implementations Explore and apply the guidance provided by the NIST Cybersecurity Framework
510 kr
Skickas inom 7-10 vardagar
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCNP and CCIE Security Core SCOR 350-701 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide, Second Edition helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Expert author Omar Santos shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.
This complete study package includes
A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which let you decide how much time you need to spend on each section Exam Topic lists that make referencing easy Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study timeContent Update Program:
This fully updated second edition includes the latest topics and additional information covering changes to the latest CCNP and CCIE Security Core SCOR 350-701 exam. Visit ciscopress.com/newcerts for information on annual digital updates for this book that align to Cisco exam blueprint version changes.
This official study guide helps you master all the topics on the CCNP and CCIE Security Core SCOR 350-701 exam, including
Network security Cloud security Content security Endpoint protection and detection Secure network access Visibility and enforcementCompanion Website:
The companion website contains more than 200 unique practice exam questions, practice exercises, and a study planner
Pearson Test Prep online system requirements:
Browsers: Chrome version 73 and above, Safari version 12 and above, Microsoft Edge 44 and above.
Devices: Desktop and laptop computers, tablets running Android v8.0 and above or iPadOS v13 and above, smartphones running Android v8.0 and above or iOS v13 and above with a minimum screen size of 4.7”. Internet access required.
Pearson Test Prep offline system requirements:
Windows 11, Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases
Also available from Cisco Press for CCNP Advanced Routing study is the CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide Premium Edition eBook and Practice Test, Second Edition This digital-only certification preparation product combines an eBook with enhanced Pearson Test Prep Practice Test.
This integrated learning package
Enables you to focus on individual topic areas or take complete, timed exams Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions Provides unique sets of exam-realistic practice questions Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most366 kr
Skickas inom 7-10 vardagar
As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.
Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview. The book explores the ethical challenges that professionals—and, increasingly, users—are encountering as AI becomes not just a promise of the future, but a powerful tool of the present.
· An overview of the history and development of AI, from the earliest pioneers in machine learning to current applications and how it might shape the future
· Introduction to AI models and implementations, as well as examples of emerging AI trends
· Examination of vulnerabilities, including insight into potential real-world threats, and best practices for ensuring a safe AI deployment
· Discussion of how to balance accountability, privacy, and ethics with regulatory and legislative concerns with advancing AI technology
· A critical perspective on regulatory obligations, and repercussions, of AI with copyright protection, patent rights, and other intellectual property dilemmas
· An academic resource and guide for the evolving technical and intellectual challenges of AI
· Leading figures in the field bring to life the ethical issues associated with AI through in-depth analysis and case studies in this comprehensive examination.
259 kr
Skickas inom 7-10 vardagar
The AI Revolution is Here. Discover its Dynamic Applications in Networking, Cybersecurity, and More.
AI is having a profound impact on nearly every sector of the workforce. Huge professional and financial opportunities await in the key domains of computer networking, cybersecurity, IoT, and cloud computing. The AI Revolution in Networking, Cybersecurity, and Emerging Technologies will give you the edge you need to harness AI for your benefit. Learn how AI can efficiently identify shadow data, fortify security measures, generate predictive analytics in real time, and so much more.
In this comprehensive guide, Cisco professionals Omar Santos, Samer Salam, and Hazim Dahir engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow.
You'll discover how AI is building robust bridges in collaboration tools and turning IoT into a super-intelligent network of devices so you can quickly identify and resolve network security threats while enhancing network performance. This book will show you how AI can help you modernize and fortify your operations and make yourself a key asset to your company.
Are you ready to join The AI Revolution in Networking, Cybersecurity, and Emerging Technologies?
Gain industry-specific knowledge from experienced professionals Discover new capabilities like self-healing networks and predictive analytics Learn how AI can save time by detecting and correcting issues in real time Master techniques for security monitoring and alerting Understand potential security and privacy pitfalls of using AI, and how to guard against them Understand how AI works for you and with you
Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
Redefining Hacking
A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-driven World
366 kr
Skickas inom 7-10 vardagar
Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts with modern hacking methodologies and the tools to combat evolving threats. Written by industry experts Omar Santos, Savannah Lazzara, and Wesley Thurner, this book blends real-world insights with forward-looking perspectives on AI, automation, and quantum computing. Packed with hands-on exercises, actionable strategies, and case studies, it empowers readers to think like attackers while proactively strengthening their defenses. Gain practical knowledge to master red teaming, bug bounty hunting, and prepare for an AI-influenced cybersecurity landscape.
This practical forward-thinking book provides:
Holistic Coverage: Comprehensive insights into red teaming and bug bounty hunting Future Trends: Explore AI, automation, and quantum computing’s impact on security Hands-On Learning: Includes exercises, review questions, and GitHub resources Expert Guidance: Authored by seasoned cybersecurity professionals with diverse expertise925 kr
Skickas inom 7-10 vardagar
All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work
Clearly presents best practices, governance frameworks, and key standards
Includes focused coverage of healthcare, finance, and PCI DSS compliance
An essential and invaluable guide for leaders, managers, and technical professionals
Today, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: success requires everyone to work together, from leaders on down. Developing Cybersecurity Programs and Policies offers start-to-finish guidance for establishing effective cybersecurity in any organization. Drawing on more than 20 years of real-world experience, Omar Santos presents realistic best practices for defining policy and governance, ensuring compliance, and collaborating to harden the entire organization.
First, Santos shows how to develop workable cybersecurity policies and an effective framework for governing them. Next, he addresses risk management, asset management, and data loss prevention, showing how to align functions from HR to physical security. You’ll discover best practices for securing communications, operations, and access; acquiring, developing, and maintaining technology; and responding to incidents.
Santos concludes with detailed coverage of compliance in finance and healthcare, the crucial Payment Card Industry Data Security Standard (PCI DSS) standard, and the NIST Cybersecurity Framework.
Whatever your current responsibilities, this guide will help you plan, manage, and lead cybersecurity–and safeguard all the assets that matter.
Learn How To
· Establish cybersecurity policies and governance that serve your organization’s needs
· Integrate cybersecurity program components into a coherent framework for action
· Assess, prioritize, and manage security risk throughout the organization
· Manage assets and prevent data loss
· Work with HR to address human factors in cybersecurity
· Harden your facilities and physical environment
· Design effective policies for securing communications, operations, and access
· Strengthen security throughout the information systems lifecycle
· Plan for quick, effective incident response and ensure business continuity
· Comply with rigorous regulations in finance and healthcare
· Plan for PCI compliance to safely process payments
· Explore and apply the guidance provided by the NIST Cybersecurity Framework
559 kr
Skickas inom 7-10 vardagar
Cisco® ASA
All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Identify, mitigate, and respond to today’s highly-sophisticated network attacks.
Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services has been fully updated to cover the newest techniques and Cisco technologies for maximizing end-to-end security in your environment. Three leading Cisco security experts guide you through every step of creating a complete security plan with Cisco ASA, and then deploying, configuring, operating, and troubleshooting your solution.
Fully updated for today’s newest ASA releases, this edition adds new coverage of ASA 5500-X, ASA 5585-X, ASA Services Module, ASA next-generation firewall services, EtherChannel, Global ACLs, clustering, IPv6 improvements, IKEv2, AnyConnect Secure Mobility VPN clients, and more. The authors explain significant recent licensing changes; introduce enhancements to ASA IPS; and walk you through configuring IPsec, SSL VPN, and NAT/PAT.
You’ll learn how to apply Cisco ASA adaptive identification and mitigation services to systematically strengthen security in network environments of all sizes and types. The authors present up-to-date sample configurations, proven design scenarios, and actual debugs–all designed to help you make the most of Cisco ASA in your rapidly evolving network.
Jazib Frahim, CCIE® No. 5459 (Routing and Switching; Security), Principal Engineer in the Global Security Solutions team, guides top-tier Cisco customers in security-focused network design and implementation. He architects, develops, and launches new security services concepts. His books include Cisco SSL VPN Solutions and Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting.
Omar Santos, CISSP No. 463598, Cisco Product Security Incident Response Team (PSIRT) technical leader, leads and mentors engineers and incident managers in investigating and resolving vulnerabilities in Cisco products and protecting Cisco customers. Through 18 years in IT and cybersecurity, he has designed, implemented, and supported numerous secure networks for Fortune® 500 companies and the U.S. government. He is also the author of several other books and numerous whitepapers and articles.
Andrew Ossipov, CCIE® No. 18483 and CISSP No. 344324, is a Cisco Technical Marketing Engineer focused on firewalls, intrusion prevention, and data center security. Drawing on more than 16 years in networking, he works to solve complex customer technical problems, architect new features and products, and define future directions for Cisco’s product portfolio. He holds several pending patents.
Understand, install, configure, license, maintain, and troubleshoot the newest ASA devices
Efficiently implement Authentication, Authorization, and Accounting (AAA) services
Control and provision network access with packet filtering, context-aware Cisco ASA next-generation firewall services, and new NAT/PAT concepts
Configure IP routing, application inspection, and QoS
Create firewall contexts with unique configurations, interfaces, policies, routing tables, and administration
Enable integrated protection against many types of malware and advanced persistent threats (APTs) via Cisco Cloud Web Security and Cisco Security Intelligence Operations (SIO)
Implement high availability with failover and elastic scalability with clustering
Deploy, troubleshoot, monitor, tune, and manage Intrusion Prevention System (IPS) features
Implement site-to-site IPsec VPNs and all forms of remote-access VPNs (IPsec, clientless SSL, and client-based SSL)
Configure and troubleshoot Public Key Infrastructure (PKI)
Use IKEv2 to more effectively resist attacks against VPNs
Leverage IPv6 support for IPS, packet inspection, transparent firewalls, and site-to-site IPsec VPNs
Network Security with NetFlow and IPFIX
Big Data Analytics for Information Security
745 kr
Skickas inom 3-6 vardagar
A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security
Today’s world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches. Visibility into the network is an indispensable tool for network and security professionals and Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing.
Network Security with NetFlow and IPFIX is a key resource for introducing yourself to and understanding the power behind the Cisco NetFlow solution. Omar Santos, a Cisco Product Security Incident Response Team (PSIRT) technical leader and author of numerous books including the CCNA Security 210-260 Official Cert Guide, details the importance of NetFlow and demonstrates how it can be used by large enterprises and small-to-medium-sized businesses to meet critical network challenges. This book also examines NetFlow’s potential as a powerful network security tool.
Network Security with NetFlow and IPFIX explores everything you need to know to fully understand and implement the Cisco Cyber Threat Defense Solution. It also provides detailed configuration and troubleshooting guidance, sample configurations with depth analysis of design scenarios in every chapter, and detailed case studies with real-life scenarios.
You can follow Omar on Twitter: @santosomar
NetFlow and IPFIX basics Cisco NetFlow versions and features Cisco Flexible NetFlow NetFlow Commercial and Open Source Software Packages Big Data Analytics tools and technologies such as Hadoop, Flume, Kafka, Storm, Hive, HBase, Elasticsearch, Logstash, Kibana (ELK) Additional Telemetry Sources for Big Data Analytics for Cyber Security Understanding big data scalability Big data analytics in the Internet of everything Cisco Cyber Threat Defense and NetFlow Troubleshooting NetFlow Real-world case studies863 kr
Skickas inom 3-6 vardagar
CCNA Cyber Ops SECFND 210-250 Official Cert Guide from Cisco Press allows you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Cisco enterprise security experts Omar Santos, Joseph Muniz, and Stefano De Crescenzo share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.
This complete study package includes
A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep practice test software, with two full sample exams containing 120 well-reviewed, exam-realistic questions, customization options, and detailed performance reports A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study timeWell regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success.
The official study guide helps you master topics on the CCNA Cyber Ops SECFND 210-250 exam, including:
Network concepts Security concepts Cryptography Host-based analysis Security monitoring Attack methods842 kr
Skickas inom 3-6 vardagar
Learn, prepare, and practice for CCNA Cyber Ops SECOPS #210-255 exam success with this Official Cert Guide from Pearson IT Certification, a leader in IT Certification learning.
Master CCNA Cyber Ops SECOPS #210-255 exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam preparation tasks Practice with realistic exam questionsCCNA Cyber Ops SECOPS 210-255 Official Cert Guide is a best-of-breed exam study guide. Best-selling authors and internationally respected cybersecurity experts Omar Santos and Joseph Muniz share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.
The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge and a final preparation chapter guides you through tools and resources to help you craft your final study plan.
The companion website contains the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most.
Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time.
The study guide helps you master all the topics on the SECOPS #210-255 exam, including:
Threat analysis Forensics Intrusion analysis NetFlow for cybersecurity Incident response and the incident handling process Incident response teams Compliance frameworks Network and host profiling Data and event analysis Intrusion event categoriesCompanion WebsiteThe website contains two free, complete practice exams.Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test
Pearson Test Prep online system requirements:Browsers: Chrome version 40 and above, Firefox version 35 and above, Safari version 7, Internet Explorer 10, 11, Microsoft Edge, Opera. Devices: Desktop andlaptop computers, tablets running on Android and iOS, smartphones with a minimum screen size of 4.7". Internet access required.
Pearson Test Prep offline system requirements:Windows 10, Windows 8.1, Windows 7, or Vista (SP2), Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases
642 kr
Skickas inom 3-6 vardagar
389 kr
Kommande
216 kr
Kommande
285 kr
Kommande