Summary
During the course of this chapter, you learned about common network-based attacks that hackers use to disrupt the availability of services for legitimate users, such as DoS attacks, and how vulnerabilities found within common network protocols are used to create protocol-based attacks. Furthermore, you gained the skills to describe web-based attacks and understand how threat actors use social engineering to compromise their targets. Lastly, you learned about various methods hackers use to ensure their cyberattack can't be detected by security appliances by using techniques such as evasion and obfuscation.
I hope this chapter has been informative for you and is helpful in your journey toward learning the foundations of cybersecurity operations, as well as gaining your Cisco Certified CyberOps Associate certification. In the next Chapter 6, Working with Cryptography and PKI, you will learn about various cryptographic standards and the public key infrastructure (PKI)...