From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 3 Host-Based Analysis

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Outline the network architecture

Outline the network architecture

- [Instructor] Active threat monitoring requires knowledge of the network. In this segment, we'll explain how the layout of the network can influence the data flow and how security appliances and services such as Simple Network Management Protocol and NetFlow can monitor and help secure the network. When designing a network, device placement can influence the way the traffic is protected and monitored. An enterprise network is comprised of infrastructure devices and end points. Infrastructure devices interconnect end points. Data passes through the devices and includes routers, switches, and wireless access points. End points accept network communication and includes workstations, storage area networking devices, servers, IP phones, IoT devices, and remote and mobile workers. The day-to-day operations of a network administrator consist of monitoring traffic flow, bandwidth usage, and access to resources. Tools such as…

Contents