{"id":483,"date":"2019-03-04T07:00:51","date_gmt":"2019-03-04T13:00:51","guid":{"rendered":"https:\/\/packitforwarding.com\/?p=483"},"modified":"2020-02-25T09:31:39","modified_gmt":"2020-02-25T15:31:39","slug":"ccna-cyberops-secfnd-objective-2-0","status":"publish","type":"post","link":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/","title":{"rendered":"CCNA CyberOps SECFND Objective 2.1"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p> Describe the principles of the defense in depth strategy&nbsp; <\/p><cite>Understanding Cisco Cybersecurity Fundamentals (210-250)<br><\/cite><\/blockquote>\n\n\n\n<p>Defense in depth uses a layered approach to security. Each layer by itself is not secure, but together they provide a better security for the data being protected. These layers can be summarized as the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Nontechnical: policies, procedures and training<\/li><li>Physical security: cameras, physical access controls like badge readers, locks<\/li><li>Network security: routing protocol authentication, control plane policing, network device hardening<\/li><li>Host security: AMP, AV, HIPS<\/li><li>Application security: Software Development Lifecycle, testing, fuzzing<\/li><li>Data: Encryption at rest and transit<\/li><li><\/li><\/ul>\n\n\n\n<p>Layers used must be evaluated to keep them from over complicating security causing additional attack vectors to be created.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Describe the principles of the defense in depth strategy&nbsp; Understanding Cisco Cybersecurity Fundamentals (210-250) Defense in depth uses a layered approach to security. Each layer by itself is not secure, but together they provide a better security for the data being protected. These layers can be summarized as the following: Nontechnical: policies, procedures and training [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":486,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"CCNA CyberOps SECFND Objective 2.0 - Study Notes #ccnacyberops #ciscochampion","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[88,105,31,24],"tags":[107,90,106,149],"class_list":["post-483","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ccna-cyberops","category-certification","category-cisco","tag-ccna-cyberops","tag-certification","tag-cisco","tag-cisco-certified-cyber-ops-associate"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CCNA CyberOps SECFND Objective 2.1 -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CCNA CyberOps SECFND Objective 2.1 -\" \/>\n<meta property=\"og:description\" content=\"Describe the principles of the defense in depth strategy&nbsp; Understanding Cisco Cybersecurity Fundamentals (210-250) Defense in depth uses a layered approach to security. Each layer by itself is not secure, but together they provide a better security for the data being protected. These layers can be summarized as the following: Nontechnical: policies, procedures and training [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-04T13:00:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-25T15:31:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1146\" \/>\n\t<meta property=\"og:image:height\" content=\"778\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ben Story\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/www.twitter.com\/ntwrk80\" \/>\n<meta name=\"twitter:site\" content=\"@ntwrk80\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ben Story\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/04\\\/ccna-cyberops-secfnd-objective-2-0\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/04\\\/ccna-cyberops-secfnd-objective-2-0\\\/\"},\"author\":{\"name\":\"Ben Story\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"headline\":\"CCNA CyberOps SECFND Objective 2.1\",\"datePublished\":\"2019-03-04T13:00:51+00:00\",\"dateModified\":\"2020-02-25T15:31:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/04\\\/ccna-cyberops-secfnd-objective-2-0\\\/\"},\"wordCount\":118,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/04\\\/ccna-cyberops-secfnd-objective-2-0\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ogres-layers.jpg?fit=1146%2C778&ssl=1\",\"keywords\":[\"CCNA CyberOps\",\"certification\",\"cisco\",\"Cisco Certified Cyber Ops Associate\"],\"articleSection\":[\"Blog\",\"CCNA CyberOps\",\"Certification\",\"cisco\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/04\\\/ccna-cyberops-secfnd-objective-2-0\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/04\\\/ccna-cyberops-secfnd-objective-2-0\\\/\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/04\\\/ccna-cyberops-secfnd-objective-2-0\\\/\",\"name\":\"CCNA CyberOps SECFND Objective 2.1 -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/04\\\/ccna-cyberops-secfnd-objective-2-0\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/04\\\/ccna-cyberops-secfnd-objective-2-0\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ogres-layers.jpg?fit=1146%2C778&ssl=1\",\"datePublished\":\"2019-03-04T13:00:51+00:00\",\"dateModified\":\"2020-02-25T15:31:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/04\\\/ccna-cyberops-secfnd-objective-2-0\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/04\\\/ccna-cyberops-secfnd-objective-2-0\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/04\\\/ccna-cyberops-secfnd-objective-2-0\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ogres-layers.jpg?fit=1146%2C778&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ogres-layers.jpg?fit=1146%2C778&ssl=1\",\"width\":1146,\"height\":778},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/03\\\/04\\\/ccna-cyberops-secfnd-objective-2-0\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/packitforwarding.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CCNA CyberOps SECFND Objective 2.1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/\",\"name\":\"\",\"description\":\"Paying it forward to the next generation of IT.\",\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/packitforwarding.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\",\"name\":\"Ben Story\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"width\":489,\"height\":250,\"caption\":\"Ben Story\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\"},\"description\":\"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/packitforwarding\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/benstory\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/www.twitter.com\\\/ntwrk80\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CCNA CyberOps SECFND Objective 2.1 -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/","og_locale":"en_US","og_type":"article","og_title":"CCNA CyberOps SECFND Objective 2.1 -","og_description":"Describe the principles of the defense in depth strategy&nbsp; Understanding Cisco Cybersecurity Fundamentals (210-250) Defense in depth uses a layered approach to security. Each layer by itself is not secure, but together they provide a better security for the data being protected. These layers can be summarized as the following: Nontechnical: policies, procedures and training [&hellip;]","og_url":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/","article_publisher":"https:\/\/www.facebook.com\/packitforwarding","article_author":"https:\/\/www.facebook.com\/packitforwarding","article_published_time":"2019-03-04T13:00:51+00:00","article_modified_time":"2020-02-25T15:31:39+00:00","og_image":[{"width":1146,"height":778,"url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1","type":"image\/jpeg"}],"author":"Ben Story","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/www.twitter.com\/ntwrk80","twitter_site":"@ntwrk80","twitter_misc":{"Written by":"Ben Story","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/#article","isPartOf":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/"},"author":{"name":"Ben Story","@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"headline":"CCNA CyberOps SECFND Objective 2.1","datePublished":"2019-03-04T13:00:51+00:00","dateModified":"2020-02-25T15:31:39+00:00","mainEntityOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/"},"wordCount":118,"commentCount":0,"publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1","keywords":["CCNA CyberOps","certification","cisco","Cisco Certified Cyber Ops Associate"],"articleSection":["Blog","CCNA CyberOps","Certification","cisco"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/","url":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/","name":"CCNA CyberOps SECFND Objective 2.1 -","isPartOf":{"@id":"https:\/\/packitforwarding.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/#primaryimage"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1","datePublished":"2019-03-04T13:00:51+00:00","dateModified":"2020-02-25T15:31:39+00:00","breadcrumb":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/#primaryimage","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1","width":1146,"height":778},{"@type":"BreadcrumbList","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/packitforwarding.com\/"},{"@type":"ListItem","position":2,"name":"CCNA CyberOps SECFND Objective 2.1"}]},{"@type":"WebSite","@id":"https:\/\/packitforwarding.com\/#website","url":"https:\/\/packitforwarding.com\/","name":"","description":"Paying it forward to the next generation of IT.","publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/packitforwarding.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8","name":"Ben Story","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","width":489,"height":250,"caption":"Ben Story"},"logo":{"@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1"},"description":"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.","sameAs":["https:\/\/www.facebook.com\/packitforwarding","https:\/\/www.linkedin.com\/in\/benstory","https:\/\/x.com\/https:\/\/www.twitter.com\/ntwrk80"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pay9MD-7N","jetpack-related-posts":[{"id":819,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/08\/11\/ccna-cyberops-secops-objective-2-8\/","url_meta":{"origin":483,"position":0},"title":"CCNA CyberOps SECOPS &#8211; Objective 2.8","author":"Ben Story","date":"August 11, 2019","format":false,"excerpt":"Compare and contrast impact and no impact for these items: False Positive, False Negative, True Positive, True NegativeImplementing Cisco Cybersecurity Operations (210-255) Security analysts must work to minimize both false positives and false negatives. False positives take up time to determine that the detection is not a problem. False negatives\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/teddy-teddy-bear-association-ill-42230.jpeg?fit=640%2C518&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/teddy-teddy-bear-association-ill-42230.jpeg?fit=640%2C518&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/teddy-teddy-bear-association-ill-42230.jpeg?fit=640%2C518&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":463,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/02\/28\/cisco-certified-network-associate-cyberops\/","url_meta":{"origin":483,"position":1},"title":"Cisco Certified Network Associate &#8211; CyberOps","author":"Ben Story","date":"February 28, 2019","format":false,"excerpt":"Cisco's cybersecurity certification is the CCNA CyberOps. The certification is composed of two exams. The first exam is 210-250 SECFND: Understanding Cisco Cybersecurity Fundamentals. This exam sets the foundation for an engineer to understand the terminology and tools used by a Security Operations Center(SOC) engineer. The second half of the\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":488,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/05\/ccna-cyberops-secfnd-objective-2-2\/","url_meta":{"origin":483,"position":2},"title":"CCNA CyberOps SECFND Objective 2.2","author":"Ben Story","date":"March 5, 2019","format":false,"excerpt":"Compare and contrast these concepts: Risk, Threat, Vulnerability, and Exploit.Understanding Cisco Cybersecurity Fundamentals (210-250) Risk: the possibility that something bad will happenThreat: any potential danger to a security assetVulnerability: exploitable weakness in a system or designExploit: software or commands that take advantage of a vulnerability Risk is the possibility of\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/roulette-roulette-wheel-ball-turn.jpg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/roulette-roulette-wheel-ball-turn.jpg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/roulette-roulette-wheel-ball-turn.jpg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":845,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/08\/15\/ccna-cyberops-secops-objective-3-4\/","url_meta":{"origin":483,"position":3},"title":"CCNA CyberOps SECOPS &#8211; Objective 3.4","author":"Ben Story","date":"August 15, 2019","format":false,"excerpt":"Describe the goals of the given CSIRT Implementing Cisco Cybersecurity Operations (210-255) A Computer Security Incident Response Team (CSIRT) can come in several different forms. Internal CSIRT - an Internal CSIRT is established by an organization to handle incident response for their own organization.National CSIRT - National CSIRTs provide services\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Photo by Markus Spiske temporausch.com from Pexels","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/pexels-photo-193349.jpeg?fit=640%2C960&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/pexels-photo-193349.jpeg?fit=640%2C960&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/pexels-photo-193349.jpeg?fit=640%2C960&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":770,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/08\/05\/ccna-cyberops-secops-objective-2-1\/","url_meta":{"origin":483,"position":4},"title":"CCNA CyberOps SECOPS &#8211; Objective 2.1","author":"Ben Story","date":"August 5, 2019","format":false,"excerpt":"Interpret basic regular expressions Implementing Cisco Cybersecurity Operations (210-255) Regular expressions are very useful to security analysts when analyzing logs and other security artifacts. There are several standard regular expression operators that you should understand for the CCNA CyberOps curriculum. OperatorDescription[]Match any of the characters in the brackets{#}Repeat match #\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Photo by rawpixel.com from Pexels","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1496139.jpeg?fit=640%2C613&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1496139.jpeg?fit=640%2C613&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/01\/pexels-photo-1496139.jpeg?fit=640%2C613&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":873,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/08\/23\/ccna-cyberops-secops-objective-4-6\/","url_meta":{"origin":483,"position":5},"title":"CCNA CyberOps SECOPS &#8211; Objective 4.6","author":"Ben Story","date":"August 23, 2019","format":false,"excerpt":"Identify potentially compromised hosts within the network based on a threat analysis report containing malicious IP address or domains Implementing Cisco Cybersecurity Operations (210-255) A threat analysis report helps an analyst by providing a list of all of the IPs or domains that a potentially compromised host has been communicating\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"Screenshot of a FMC host profile.","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/host-profile.png?fit=1106%2C805&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/host-profile.png?fit=1106%2C805&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/host-profile.png?fit=1106%2C805&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/host-profile.png?fit=1106%2C805&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/host-profile.png?fit=1106%2C805&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/comments?post=483"}],"version-history":[{"count":1,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/483\/revisions"}],"predecessor-version":[{"id":1068,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/483\/revisions\/1068"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media\/486"}],"wp:attachment":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media?parent=483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/categories?post=483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/tags?post=483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}