From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 3 Host-Based Analysis
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Outline the network architecture
From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 3 Host-Based Analysis
Outline the network architecture
- [Instructor] Active threat monitoring requires knowledge of the network. In this segment, we'll explain how the layout of the network can influence the data flow and how security appliances and services such as Simple Network Management Protocol and NetFlow can monitor and help secure the network. When designing a network, device placement can influence the way the traffic is protected and monitored. An enterprise network is comprised of infrastructure devices and end points. Infrastructure devices interconnect end points. Data passes through the devices and includes routers, switches, and wireless access points. End points accept network communication and includes workstations, storage area networking devices, servers, IP phones, IoT devices, and remote and mobile workers. The day-to-day operations of a network administrator consist of monitoring traffic flow, bandwidth usage, and access to resources. Tools such as…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.