1 00:00:07,320 --> 00:00:11,220 - [Instructor] Let's start out with section 1.2a 2 00:00:11,220 --> 00:00:12,973 of the CyberOps blueprint. 3 00:00:13,890 --> 00:00:16,380 This section focuses on network, endpoint, 4 00:00:16,380 --> 00:00:18,603 and application security systems. 5 00:00:20,550 --> 00:00:24,440 The Cisco CyberOps Associate certification 6 00:00:24,440 --> 00:00:28,600 assumes that you have familiarity with what routers, 7 00:00:28,600 --> 00:00:32,700 switches, firewalls, intrusion detection 8 00:00:32,700 --> 00:00:35,190 and prevention systems are. 9 00:00:35,190 --> 00:00:39,663 However, here's a quick refresh for your reference. 10 00:00:39,663 --> 00:00:42,810 Many network security devices have been invented 11 00:00:42,810 --> 00:00:45,820 throughout the years to enforce policy 12 00:00:45,820 --> 00:00:49,340 and maintain visibility of everything that is happening 13 00:00:49,340 --> 00:00:51,100 in the network. 14 00:00:51,100 --> 00:00:54,523 These network security devices are included here: 15 00:00:56,100 --> 00:01:00,090 traditional and NextGen firewalls, 16 00:01:00,090 --> 00:01:03,670 as well as personal firewalls, 17 00:01:03,670 --> 00:01:05,750 intrusion detection systems 18 00:01:05,750 --> 00:01:08,710 and intrusion prevention systems, 19 00:01:08,710 --> 00:01:13,270 as well as next-generation intrusion prevention systems, 20 00:01:13,270 --> 00:01:18,270 anomaly detection systems, advanced malware protection, 21 00:01:19,640 --> 00:01:24,593 web security appliances, email security appliances, 22 00:01:26,120 --> 00:01:28,880 identity management systems, 23 00:01:28,880 --> 00:01:31,100 as well as endpoint software, 24 00:01:31,100 --> 00:01:33,850 such as antivirus, anti-malware, 25 00:01:33,850 --> 00:01:35,720 host intrusion detection systems 26 00:01:35,720 --> 00:01:37,533 and host-based firewalls.