Home > Articles > Challenges in the Security Operations Center (SOC)

Challenges in the Security Operations Center (SOC)

Chapter Description

In this sample chapter from Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide, you will learn how attackers obtain stealth access and the tricks used to negatively impact detection and forensic technologies.

Review All Key Topics

Review the most important topics in the chapter, noted with the Key Topic icon in the outer margin of the page. Table 12-2 lists these key topics and the page numbers on which each is found.

Images

Table 12-2 Key Topics for Chapter 12

Key Topic Element

Description

Page

Paragraph

Understanding the challenges that encryption introduces to security monitoring

500

Paragraph

Understanding the challenges that NAT introduces to security monitoring

501

Section

Security Monitoring and Tor

504

Summary

Understanding the challenges that peer-to-peer communication introduces to security monitoring

505

List

Key encryption and tunneling concepts

508

List

Key resource exhaustion concepts

509

List

Key traffic fragmentation concepts

510

List

Key protocol misinterpretation concepts

511

List

Understanding traffic substitution and insertion concepts

512

List

Understanding pivoting (lateral movement)

516

5. Define Key Terms | Next Section Previous Section

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.