Section 2: Principles of Security Monitoring
This section is designed to take the reader through intermediate topics such as the components of a Security Operations Center (SOC) and its functions, various data types on a network, how data can change as it passes through networking devices and technologies, various modern cyber threats and attacks, and cryptography.
This section contains the following chapters:
- Chapter 4, Understanding Security Principles
- Chapter 5, Identifying Attack Methods
- Chapter 6, Working with Cryptography and PKI