Summary
During the course of this chapter, we have covered a lot of essential topics that every cybersecurity professional will need to know about in their career. You have learned about the need for an SOC and the three types of SOCs and their objectives. We have covered a lot of content on data types and their visibility on a network. You have discovered how networking services and technologies can change the source address of a packet and even how data encryption creates concern in security monitoring. Additionally, you have learned how threat actors use trusted protocols such as email-based protocols to exfiltrate data from corporate networks. It's important that you understand all these topics as they will all play a vital role in your career as a cybersecurity professional.
I hope this chapter has been informative for you and will benefit you on your journey to learning the foundations of cybersecurity operations and acquiring your Cisco Certified CyberOps Associate...