logo

Introduction to Network Cyber Defense and Investigations

1

Rent or Buy eTextbook

Lifetime

194.11 SAR

Inclusive of VAT


Note: This product is digital and will be delivered through the e-mail that was entered when registering on the site, you’ll receive an e-mail message containing the digital product code that you will use later for activation once the payment is completed. To learn how to get the product please click here

Discription

As digital crime increases exponentially, the need for investigative expertise in corporate, government, and academic sectors has increased as well. Defending networks and maintaining a strong security posture is the primary mission for those individuals tasked with this responsibility. The Introduction to Network Cyber Defense and Investigations textbook addresses the critical topics and skills needed to ensure organizational networks remain secure and functional for its users. Readers will be presented with knowledge of core foundational principles such as Enterprise Network Devices, Network Services, Host and Network Forensic Analysis, Evidence Collection, Chain of Custody Requirements, and Reporting and Documentation requirements. The target audience for this textbook includes Cybersecurity Analysts, Computer Science and Information Technology students, and entry-level professionals employed by Security Operations Centers.As digital crime increases exponentially, the need for investigative expertise in corporate, government, and academic sectors has increased as well. Defending networks and maintaining a strong security posture is the primary mission for those individuals tasked with this responsibility. The Introduction to Network Cyber Defense and Investigations textbook addresses the critical topics and skills needed to ensure organizational networks remain secure and functional for its users. Readers will be presented with knowledge of core foundational principles such as Enterprise Network Devices, Network Services, Host and Network Forensic Analysis, Evidence Collection, Chain of Custody Requirements, and Reporting and Documentation requirements. The target audience for this textbook includes Cybersecurity Analysts, Computer Science and Information Technology students, and entry-level professionals employed by Security Operations Centers.

ISBN 9798987468210
EISBN 9798987468265
Author Michael I. Kaplan
Publisher Phase2 Advantage

Book Reviews

tikbook whatsapp