Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
CCNA Cyber Ops SECOPS - Certification Guide 210-255
CCNA Cyber Ops SECOPS - Certification Guide 210-255

CCNA Cyber Ops SECOPS - Certification Guide 210-255: Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate

Arrow left icon
Profile Icon Chu
Arrow right icon
₱579.99 ₱1796.99
eBook Jul 2019 352 pages 1st Edition
eBook
₱579.99 ₱1796.99
Paperback
₱2245.99
Subscription
Free Trial
Arrow left icon
Profile Icon Chu
Arrow right icon
₱579.99 ₱1796.99
eBook Jul 2019 352 pages 1st Edition
eBook
₱579.99 ₱1796.99
Paperback
₱2245.99
Subscription
Free Trial
eBook
₱579.99 ₱1796.99
Paperback
₱2245.99
Subscription
Free Trial

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

CCNA Cyber Ops SECOPS - Certification Guide 210-255

Classifying Threats

This chapter looks at the Common Vulnerability Scoring System v3.0 (CVSS v3.0) in order to introduce common terminology, as well as to split the large topic of cyber-threat into three areas of impact, and five areas of vulnerability. Candidates for 210-255 must be able to define these terms.

CVSS 3.0 terms and definitions are 5% of the 210-255 certification exam, and they are marks which only require memory; no analysis is required. This will ease you into the book and provides a baseline that you can work from. CVSS 3.0 is also important because part of your future role in a SOC may involve briefing non-technical staff about CVSS reports.

The following topics will be covered in this chapter:

  • Categorizing and communicating threats
  • Exploitability metrics
  • Impact metrics
  • Scope

Categorizing and communicating threats

One of the primary roles of technical staff is to communicate threat severity to non-technical members of staff. This technical judgment informs operational decision-making, so it is important to have standard measurements and vocabulary. In this section, you will learn about the need for a common framework to describe threats; specifically, we will look at two important analysis tools to identify differences between their outputs.

All information systems carry inherent risks. Even paper-based systems have vulnerabilities (how is paper stored? What happens if there's a fire or flood? Can the records be lost?). In cybersecurity, endpoint threat analysis covers all threats that affect a computer system that a user interacts with. Whilst this seems self-explanatory, it is important to dig down into the terms. Endpoint is specified as distinct...

Exploitability metrics

Exploitability is a series of metrics in CVSS 3.0 that describe how difficult it would be for an attacker to exploit a vulnerability. In this section, you will learn how to define the four areas of vulnerability and how these relate to the ease of exploitation of the threat.

To understand the importance of exploitability, consider an example from the retail world. A generally acknowledged principle in retail is that shrinkage (or shoplifting) increases if it is easier to do. For most people, the value that's gained from an attack is rarely worth the effort or risk of being caught. In the same way, the easier it is to exploit a vulnerability and conduct an attack, the more likely it is to happen, and therefore the more dangerous the vulnerability is.

Attack...

Impact metrics

The most common model that's used to understand a threat's impact on information security is the confidentiality, integrity, availability (CIA) triad. In this section, you will learn how to explain these three types of consequence that result from a threat. The CIA triad is very common across the whole industry.

In CVSS v3.0, these three components are referred to collectively as impact metrics. Each is scored independently as either high, low, or none to give the user an overview of how severe the effects of the threat would be if they were realized. If multiple components are vulnerable to the threat, the scores are taken from the component which suffers the most severe consequences.

Confidentiality

...

Scope

CVSS v3.0 incorporated a new measure which reflects the ability for a vulnerability in one component to impact other resources and components. In this section, you will come to understand that a threat can sometimes have impacts beyond its individual capacity, and this must be captured in CVSS v3.0 under the scope metric.

The authorization scope or scope metric refers to the privileges associated with a computing authority (for example, process, application, operating system, or sandbox environment) when granting access to computing resources (for example, files, processing, RAM, permanent storage, and so on). If a vulnerability is able to gain more (or different) access to resources than the original (normal working) authority is able to assign. The base score is greater when a scope change has occurred.

A clear example of scope change is a vulnerability escaping a sandbox...

Summary

Threats are classified using a number of different applications and methods, including AMP Threat Grid and Cuckoo Sandbox. Each threat prevention/detection/reparation tool works slightly differently, and their scores are not always transparent. The CVSS v3.0 system is open source and transparent, giving comparable results across the board. How exploitable vulnerability is depends on how far away an attacker can be from the target (attack vector), how difficult the exploit is (attack complexity), how trusted an attacker would have to become to be successful (privileges required), and whether anyone else is involved (user interaction). The impact of a vulnerability is measured against the (C)onfidentiality (I)ntegrity (A)vailability triad.

In the next chapter, we will be looking at the fundamental differences between the Windows and Linux operating systems.

...

Questions

In Cisco exams, you are not permitted to go back and review or change previous answers.
Questions in the exam increase in complexity and difficulty, and later questions may assist you with earlier ones. Test yourself under Cisco exam conditions as you get more confident!
  1. Which metric relates to "the context by which vulnerability exploitation is possible"?
    1. Attack Vector
    2. Attack Complexity
    3. Attack Pathway
    4. Attack Vulnerability
  2. Which metric relates to "conditions beyond the attacker's control that are required in order to successfully exploit a vulnerability"?
    1. Privileges Required
    2. Attack Complexity
    3. Attack Prerequisites
    4. Attack Vector
  3. An attacker is able to place a call and listen to a victim's microphone without the victim accepting the call. Which CVSS 3.0 metric will rate the highest?
    1. Availability
    2. Confidentiality
    3. Integrity
    4. Scope
  1. An...

Further reading

Left arrow icon Right arrow icon

Key benefits

  • Explore different security analysis tools and develop your knowledge to confidently pass the 210-255 SECOPS exam
  • Grasp real-world cybersecurity skills such as threat analysis, event correlation, and identifying malicious activity
  • Learn through mock tests, useful tips, and up-to-date exam questions

Description

Cybersecurity roles have grown exponentially in the IT industry and an increasing number of organizations have set up security operations centers (SOCs) to monitor and respond to security threats. The 210-255 SECOPS exam is the second of two exams required for the Cisco CCNA Cyber Ops certification. By providing you with fundamental knowledge of SOC events, this certification validates your skills in managing cybersecurity processes such as analyzing threats and malicious activities, conducting security investigations, and using incident playbooks. You'll start by understanding threat analysis and computer forensics, which will help you build the foundation for learning intrusion analysis and incident response principles. The book will then guide you through vocabulary and techniques for analyzing data from the network and previous events. In later chapters, you'll discover how to identify, analyze, correlate, and respond to incidents, including how to communicate technical and inaccessible (non-technical) examples. You'll be able to build on your knowledge as you learn through examples and practice questions, and finally test your knowledge with two mock exams that allow you to put what you’ve learned to the test. By the end of this book, you'll have the skills to confidently pass the SECOPS 210-255 exam and achieve CCNA Cyber Ops certification.

Who is this book for?

This book is for anyone who wants to prepare for the Cisco 210-255 SECOPS exam (CCNA Cyber Ops). If you’re interested in cybersecurity, have already completed cybersecurity training as part of your formal education, or you work in Cyber Ops and just need a new certification, this book is for you. The certification guide looks at cyber operations from the ground up, consolidating concepts you may or may not have heard about before, to help you become a better cybersecurity operator.

What you will learn

  • Get up to speed with the principles of threat analysis in a network and on a host device
  • Understand the impact of computer forensics
  • Examine typical and atypical network data to identify intrusions
  • Identify the role of the SOC and explore other individual roles in incident response
  • Analyze data and events using common frameworks
  • Learn the phases of an incident and how incident response priorities change for each phase

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Jul 04, 2019
Length: 352 pages
Edition : 1st
Language : English
ISBN-13 : 9781838554781
Vendor :
Cisco
Tools :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Jul 04, 2019
Length: 352 pages
Edition : 1st
Language : English
ISBN-13 : 9781838554781
Vendor :
Cisco
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just ₱260 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just ₱260 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 6,737.97
CCNA Security 210-260 Certification Guide
₱2245.99
CCNA Routing and Switching 200-125 Certification Guide
₱2245.99
CCNA Cyber Ops SECOPS - Certification Guide 210-255
₱2245.99
Total 6,737.97 Stars icon
Banner background image

Table of Contents

23 Chapters
Section 1: Endpoint Threat Analysis and Forensics Chevron down icon Chevron up icon
Classifying Threats Chevron down icon Chevron up icon
Operating System Families Chevron down icon Chevron up icon
Computer Forensics and Evidence Handling Chevron down icon Chevron up icon
Section 2: Intrusion Analysis Chevron down icon Chevron up icon
Identifying Rogue Data from a Dataset Chevron down icon Chevron up icon
Warning Signs from Network Data Chevron down icon Chevron up icon
Network Security Data Analysis Chevron down icon Chevron up icon
Section 3: Incident Response Chevron down icon Chevron up icon
Roles and Responsibilities During an Incident Chevron down icon Chevron up icon
Network and Server Profiling Chevron down icon Chevron up icon
Compliance Frameworks Chevron down icon Chevron up icon
Section 4: Data and Event Analysis Chevron down icon Chevron up icon
Data Normalization and Exploitation Chevron down icon Chevron up icon
Drawing Conclusions from the Data Chevron down icon Chevron up icon
Section 5: Incident Handling Chevron down icon Chevron up icon
The Cyber Kill Chain Model Chevron down icon Chevron up icon
Incident-Handling Activities Chevron down icon Chevron up icon
Section 6: Mock Exams Chevron down icon Chevron up icon
Mock Exam 1 Chevron down icon Chevron up icon
Mock Exam 2 Chevron down icon Chevron up icon
Assessments Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.