Summary
During the course of this chapter, you have gained the essential skills to perform DNS inspection, using one of the most popular protocol analyzers within the industry – Wireshark. To conclude the chapter, we discussed the role and functionality of network devices and security appliances and how they work together to forward traffic between devices and to filter malicious traffic.
I hope this chapter has been informative for you and will be helpful in your journey toward learning the foundations of cybersecurity operations and gaining your Cisco Certified CyberOps Associate certification.
In the next chapter, Chapter 3, Discovering Security Concepts, you will learn how to get started with using a cybersecurity approach to secure your assets.