Summary
During the course of this chapter, you have learned how security appliances and solutions contain data in the form of important artifacts about network-based intrusions, and how using solutions such as Cisco FMC can provide an entire view of the security landscape of a network. Additionally, you learned how to use regex to assist in finding specific events in large sets of data on a system. Furthermore, you have learned the importance of implementing proper asset management policies, configuration, and mobile device management policies, as well as patch and vulnerability management policies, to help reduce the risk of a cyberattack.
I hope this chapter has been informative for you and is helpful in your journey toward learning the foundations of cybersecurity operations and gaining your Cisco Certified CyberOps Associate certification. In the next chapter, you will learn about advanced topics such as frameworks, incident response teams and their roles and functions, and...