|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Andrew ChuPublisher: Packt Publishing Limited Imprint: Packt Publishing Limited ISBN: 9781838559861ISBN 10: 1838559868 Pages: 352 Publication Date: 04 July 2019 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsTable of Contents Classifying Threats Operating System families and key differences in structure Computer Forensics and Evidence handling Identifying rogue data from a data set Warning signs from network data Network security data analysis Roles and responsibilities during an incident Network and Server Profiling Compliance Frameworks Data Normalization and Exploitation Drawing Conclusions From the Data The Cyber Kill Chain Model Incident Handling Activities Mock Exam 1 Mock Exam 2ReviewsAuthor InformationAndrew Chu is a networking and cybersecurity lecturer at London Metropolitan University (LMU). LMU is a Cisco Academy, Academy Support Center, and Instructor Training Center. He has a postgraduate certificate in computer science education, and teaches CCNA routing and switching, as well as CCNA Cyber Ops, through LMU. A former military engineer, he enjoys testing systems to destruction, and learning from this and sharing the results. He has over 10 years' experience of working in physical and electronic systems security, including advising on and authoring security policies and risk assessments. This includes creating a community-owned ISP; working in government service; and training industry professionals, career changers, and new students. Tab Content 6Author Website:Countries AvailableAll regions |