Author: Tom Piens
Publisher: Packt Publishing Ltd
ISBN: 1789950562
Category : Computers
Languages : en
Pages : 515
Book Description
Set up next-generation firewalls from Palo Alto Networks and get to grips with configuring and troubleshooting using the PAN-OS platform Key FeaturesUnderstand how to optimally use PAN-OS featuresBuild firewall solutions to safeguard local, cloud, and mobile networksProtect your infrastructure and users by implementing robust threat prevention solutionsBook Description To safeguard against security threats, it is crucial to ensure that your organization is effectively secured across networks, mobile devices, and the cloud. Palo Alto Networks' integrated platform makes it easy to manage network and cloud security along with endpoint protection and a wide range of security services. With this book, you'll understand Palo Alto Networks and learn how to implement essential techniques, right from deploying firewalls through to advanced troubleshooting. The book starts by showing you how to set up and configure the Palo Alto Networks firewall, helping you to understand the technology and appreciate the simple, yet powerful, PAN-OS platform. Once you've explored the web interface and command-line structure, you'll be able to predict expected behavior and troubleshoot anomalies with confidence. You'll learn why and how to create strong security policies and discover how the firewall protects against encrypted threats. In addition to this, you'll get to grips with identifying users and controlling access to your network with user IDs and even prioritize traffic using quality of service (QoS). The book will show you how to enable special modes on the firewall for shared environments and extend security capabilities to smaller locations. By the end of this network security book, you'll be well-versed with advanced troubleshooting techniques and best practices recommended by an experienced security engineer and Palo Alto Networks expert. What you will learnPerform administrative tasks using the web interface and command-line interface (CLI)Explore the core technologies that will help you boost your network securityDiscover best practices and considerations for configuring security policiesRun and interpret troubleshooting and debugging commandsManage firewalls through Panorama to reduce administrative workloadsProtect your network from malicious traffic via threat preventionWho this book is for This book is for network engineers, network security analysts, and security professionals who want to understand and deploy Palo Alto Networks in their infrastructure. Anyone looking for in-depth knowledge of Palo Alto Network technologies, including those who currently use Palo Alto Network products, will find this book useful. Intermediate-level network administration knowledge is necessary to get started with this cybersecurity book.
Mastering Palo Alto Networks
Author: Tom Piens
Publisher: Packt Publishing Ltd
ISBN: 1789950562
Category : Computers
Languages : en
Pages : 515
Book Description
Set up next-generation firewalls from Palo Alto Networks and get to grips with configuring and troubleshooting using the PAN-OS platform Key FeaturesUnderstand how to optimally use PAN-OS featuresBuild firewall solutions to safeguard local, cloud, and mobile networksProtect your infrastructure and users by implementing robust threat prevention solutionsBook Description To safeguard against security threats, it is crucial to ensure that your organization is effectively secured across networks, mobile devices, and the cloud. Palo Alto Networks' integrated platform makes it easy to manage network and cloud security along with endpoint protection and a wide range of security services. With this book, you'll understand Palo Alto Networks and learn how to implement essential techniques, right from deploying firewalls through to advanced troubleshooting. The book starts by showing you how to set up and configure the Palo Alto Networks firewall, helping you to understand the technology and appreciate the simple, yet powerful, PAN-OS platform. Once you've explored the web interface and command-line structure, you'll be able to predict expected behavior and troubleshoot anomalies with confidence. You'll learn why and how to create strong security policies and discover how the firewall protects against encrypted threats. In addition to this, you'll get to grips with identifying users and controlling access to your network with user IDs and even prioritize traffic using quality of service (QoS). The book will show you how to enable special modes on the firewall for shared environments and extend security capabilities to smaller locations. By the end of this network security book, you'll be well-versed with advanced troubleshooting techniques and best practices recommended by an experienced security engineer and Palo Alto Networks expert. What you will learnPerform administrative tasks using the web interface and command-line interface (CLI)Explore the core technologies that will help you boost your network securityDiscover best practices and considerations for configuring security policiesRun and interpret troubleshooting and debugging commandsManage firewalls through Panorama to reduce administrative workloadsProtect your network from malicious traffic via threat preventionWho this book is for This book is for network engineers, network security analysts, and security professionals who want to understand and deploy Palo Alto Networks in their infrastructure. Anyone looking for in-depth knowledge of Palo Alto Network technologies, including those who currently use Palo Alto Network products, will find this book useful. Intermediate-level network administration knowledge is necessary to get started with this cybersecurity book.
Publisher: Packt Publishing Ltd
ISBN: 1789950562
Category : Computers
Languages : en
Pages : 515
Book Description
Set up next-generation firewalls from Palo Alto Networks and get to grips with configuring and troubleshooting using the PAN-OS platform Key FeaturesUnderstand how to optimally use PAN-OS featuresBuild firewall solutions to safeguard local, cloud, and mobile networksProtect your infrastructure and users by implementing robust threat prevention solutionsBook Description To safeguard against security threats, it is crucial to ensure that your organization is effectively secured across networks, mobile devices, and the cloud. Palo Alto Networks' integrated platform makes it easy to manage network and cloud security along with endpoint protection and a wide range of security services. With this book, you'll understand Palo Alto Networks and learn how to implement essential techniques, right from deploying firewalls through to advanced troubleshooting. The book starts by showing you how to set up and configure the Palo Alto Networks firewall, helping you to understand the technology and appreciate the simple, yet powerful, PAN-OS platform. Once you've explored the web interface and command-line structure, you'll be able to predict expected behavior and troubleshoot anomalies with confidence. You'll learn why and how to create strong security policies and discover how the firewall protects against encrypted threats. In addition to this, you'll get to grips with identifying users and controlling access to your network with user IDs and even prioritize traffic using quality of service (QoS). The book will show you how to enable special modes on the firewall for shared environments and extend security capabilities to smaller locations. By the end of this network security book, you'll be well-versed with advanced troubleshooting techniques and best practices recommended by an experienced security engineer and Palo Alto Networks expert. What you will learnPerform administrative tasks using the web interface and command-line interface (CLI)Explore the core technologies that will help you boost your network securityDiscover best practices and considerations for configuring security policiesRun and interpret troubleshooting and debugging commandsManage firewalls through Panorama to reduce administrative workloadsProtect your network from malicious traffic via threat preventionWho this book is for This book is for network engineers, network security analysts, and security professionals who want to understand and deploy Palo Alto Networks in their infrastructure. Anyone looking for in-depth knowledge of Palo Alto Network technologies, including those who currently use Palo Alto Network products, will find this book useful. Intermediate-level network administration knowledge is necessary to get started with this cybersecurity book.
Mastering Palo Alto Networks
Author: Tom Piens
Publisher: Packt Publishing
ISBN: 9781789956375
Category :
Languages : en
Pages : 465
Book Description
Publisher: Packt Publishing
ISBN: 9781789956375
Category :
Languages : en
Pages : 465
Book Description
Mastering Palo Alto Networks
Author: Tom Piens
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 636
Book Description
Deploy and manage industry-leading PAN-OS 10.x solutions to secure your users and infrastructure. Palo Alto Networks' integrated platform makes it easy to manage network and cloud security along with endpoint protection and a wide range of security services. This book is an end-to-end guide to configure firewalls and deploy them in your network infrastructure. You will see how to quickly set up, configure and understand the technology, and troubleshoot any issues that may occur. This book will serve as your go-to reference for everything from setting up to troubleshooting complex issues. You will learn your way around the web interface and command-line structure, understand how the technology works so you can confidently predict the expected behavior, and successfully troubleshoot any anomalies you may encounter. Finally, you will see how to deploy firewalls in a cloud environment, and special or unique considerations when setting them to protect resources. By the end of this book, for your configuration setup you will instinctively know how to approach challenges, find the resources you need, and solve most issues efficiently.
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 636
Book Description
Deploy and manage industry-leading PAN-OS 10.x solutions to secure your users and infrastructure. Palo Alto Networks' integrated platform makes it easy to manage network and cloud security along with endpoint protection and a wide range of security services. This book is an end-to-end guide to configure firewalls and deploy them in your network infrastructure. You will see how to quickly set up, configure and understand the technology, and troubleshoot any issues that may occur. This book will serve as your go-to reference for everything from setting up to troubleshooting complex issues. You will learn your way around the web interface and command-line structure, understand how the technology works so you can confidently predict the expected behavior, and successfully troubleshoot any anomalies you may encounter. Finally, you will see how to deploy firewalls in a cloud environment, and special or unique considerations when setting them to protect resources. By the end of this book, for your configuration setup you will instinctively know how to approach challenges, find the resources you need, and solve most issues efficiently.
Securing Remote Access in Palo Alto Networks
Author: Tom Piens
Publisher: Packt Publishing Ltd
ISBN: 1801076111
Category : Computers
Languages : en
Pages : 336
Book Description
Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key FeaturesLearn the ins and outs of log forwarding and troubleshooting issuesSet up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issuesGain an in-depth understanding of user credential detection to prevent data leaks Book Description This book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs. Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection. What you will learnUnderstand how log forwarding is configured on the firewallFocus on effectively enabling remote accessExplore alternative ways for connecting users and remote networksProtect against phishing with credential detectionUnderstand how to troubleshoot complex issues confidentlyStrengthen the security posture of your firewallsWho this book is for This book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.
Publisher: Packt Publishing Ltd
ISBN: 1801076111
Category : Computers
Languages : en
Pages : 336
Book Description
Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key FeaturesLearn the ins and outs of log forwarding and troubleshooting issuesSet up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issuesGain an in-depth understanding of user credential detection to prevent data leaks Book Description This book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs. Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection. What you will learnUnderstand how log forwarding is configured on the firewallFocus on effectively enabling remote accessExplore alternative ways for connecting users and remote networksProtect against phishing with credential detectionUnderstand how to troubleshoot complex issues confidentlyStrengthen the security posture of your firewallsWho this book is for This book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.
Linux for Networking Professionals
Author: Rob VandenBrink
Publisher: Packt Publishing Ltd
ISBN: 1800204655
Category : Computers
Languages : en
Pages : 528
Book Description
Get to grips with the most common as well as complex Linux networking configurations, tools, and services to enhance your professional skills Key FeaturesLearn how to solve critical networking problems using real-world examplesConfigure common networking services step by step in an enterprise environmentDiscover how to build infrastructure with an eye toward defense against common attacksBook Description As Linux continues to gain prominence, there has been a rise in network services being deployed on Linux for cost and flexibility reasons. If you are a networking professional or an infrastructure engineer involved with networks, extensive knowledge of Linux networking is a must. This book will guide you in building a strong foundation of Linux networking concepts. The book begins by covering various major distributions, how to pick the right distro, and basic Linux network configurations. You'll then move on to Linux network diagnostics, setting up a Linux firewall, and using Linux as a host for network services. You'll discover a wide range of network services, why they're important, and how to configure them in an enterprise environment. Finally, as you work with the example builds in this Linux book, you'll learn to configure various services to defend against common attacks. As you advance to the final chapters, you'll be well on your way towards building the underpinnings for an all-Linux datacenter. By the end of this book, you'll be able to not only configure common Linux network services confidently, but also use tried-and-tested methodologies for future Linux installations. What you will learnUse Linux as a troubleshooting and diagnostics platformExplore Linux-based network servicesConfigure a Linux firewall and set it up for network servicesDeploy and configure Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) services securelyConfigure Linux for load balancing, authentication, and authorization servicesUse Linux as a logging platform for network monitoringDeploy and configure Intrusion Prevention Services (IPS)Set up Honeypot solutions to detect and foil attacksWho this book is for This book is for IT and Windows professionals and admins looking for guidance in managing Linux-based networks. Basic knowledge of networking is necessary to get started with this book.
Publisher: Packt Publishing Ltd
ISBN: 1800204655
Category : Computers
Languages : en
Pages : 528
Book Description
Get to grips with the most common as well as complex Linux networking configurations, tools, and services to enhance your professional skills Key FeaturesLearn how to solve critical networking problems using real-world examplesConfigure common networking services step by step in an enterprise environmentDiscover how to build infrastructure with an eye toward defense against common attacksBook Description As Linux continues to gain prominence, there has been a rise in network services being deployed on Linux for cost and flexibility reasons. If you are a networking professional or an infrastructure engineer involved with networks, extensive knowledge of Linux networking is a must. This book will guide you in building a strong foundation of Linux networking concepts. The book begins by covering various major distributions, how to pick the right distro, and basic Linux network configurations. You'll then move on to Linux network diagnostics, setting up a Linux firewall, and using Linux as a host for network services. You'll discover a wide range of network services, why they're important, and how to configure them in an enterprise environment. Finally, as you work with the example builds in this Linux book, you'll learn to configure various services to defend against common attacks. As you advance to the final chapters, you'll be well on your way towards building the underpinnings for an all-Linux datacenter. By the end of this book, you'll be able to not only configure common Linux network services confidently, but also use tried-and-tested methodologies for future Linux installations. What you will learnUse Linux as a troubleshooting and diagnostics platformExplore Linux-based network servicesConfigure a Linux firewall and set it up for network servicesDeploy and configure Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) services securelyConfigure Linux for load balancing, authentication, and authorization servicesUse Linux as a logging platform for network monitoringDeploy and configure Intrusion Prevention Services (IPS)Set up Honeypot solutions to detect and foil attacksWho this book is for This book is for IT and Windows professionals and admins looking for guidance in managing Linux-based networks. Basic knowledge of networking is necessary to get started with this book.
Mastering Reverse Engineering
Author: Reginald Wong
Publisher: Packt Publishing Ltd
ISBN: 1788835298
Category : Computers
Languages : en
Pages : 423
Book Description
Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses. Key FeaturesAnalyze and improvise software and hardware with real-world examplesLearn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and Radare2.Explore modern security techniques to identify, exploit, and avoid cyber threatsBook Description If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques. Next, you will explore analysis techniques using real-world tools such as IDA Pro and x86dbg. As you progress through the chapters, you will walk through use cases encountered in reverse engineering, such as encryption and compression, used to obfuscate code, and how to to identify and overcome anti-debugging and anti-analysis tricks. Lastly, you will learn how to analyse other types of files that contain code. By the end of this book, you will have the confidence to perform reverse engineering. What you will learnLearn core reverse engineeringIdentify and extract malware componentsExplore the tools used for reverse engineeringRun programs under non-native operating systemsUnderstand binary obfuscation techniquesIdentify and analyze anti-debugging and anti-analysis tricksWho this book is for If you are a security engineer or analyst or a system programmer and want to use reverse engineering to improve your software and hardware, this is the book for you. You will also find this book useful if you are a developer who wants to explore and learn reverse engineering. Having some programming/shell scripting knowledge is an added advantage.
Publisher: Packt Publishing Ltd
ISBN: 1788835298
Category : Computers
Languages : en
Pages : 423
Book Description
Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses. Key FeaturesAnalyze and improvise software and hardware with real-world examplesLearn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and Radare2.Explore modern security techniques to identify, exploit, and avoid cyber threatsBook Description If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques. Next, you will explore analysis techniques using real-world tools such as IDA Pro and x86dbg. As you progress through the chapters, you will walk through use cases encountered in reverse engineering, such as encryption and compression, used to obfuscate code, and how to to identify and overcome anti-debugging and anti-analysis tricks. Lastly, you will learn how to analyse other types of files that contain code. By the end of this book, you will have the confidence to perform reverse engineering. What you will learnLearn core reverse engineeringIdentify and extract malware componentsExplore the tools used for reverse engineeringRun programs under non-native operating systemsUnderstand binary obfuscation techniquesIdentify and analyze anti-debugging and anti-analysis tricksWho this book is for If you are a security engineer or analyst or a system programmer and want to use reverse engineering to improve your software and hardware, this is the book for you. You will also find this book useful if you are a developer who wants to explore and learn reverse engineering. Having some programming/shell scripting knowledge is an added advantage.
Zscaler Cloud Security Essentials
Author: Ravi Devarasetty
Publisher: Packt Publishing Ltd
ISBN: 1800567367
Category : Computers
Languages : en
Pages : 236
Book Description
Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users Key FeaturesGet up to speed with Zscaler without the need for expensive trainingImplement Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) security solutions with real-world deploymentsFind out how to choose the right options and features to architect a customized solution with ZscalerBook Description Many organizations are moving away from on-premises solutions to simplify administration and reduce expensive hardware upgrades. This book uses real-world examples of deployments to help you explore Zscaler, an information security platform that offers cloud-based security for both web traffic and private enterprise applications. You'll start by understanding how Zscaler was born in the cloud, how it evolved into a mature product, and how it continues to do so with the addition of sophisticated features that are necessary to stay ahead in today's corporate environment. The book then covers Zscaler Internet Access and Zscaler Private Access architectures in detail, before moving on to show you how to map future security requirements to ZIA features and transition your business applications to ZPA. As you make progress, you'll get to grips with all the essential features needed to architect a customized security solution and support it. Finally, you'll find out how to troubleshoot the newly implemented ZIA and ZPA solutions and make them work efficiently for your enterprise. By the end of this Zscaler book, you'll have developed the skills to design, deploy, implement, and support a customized Zscaler security solution. What you will learnUnderstand the need for Zscaler in the modern enterpriseStudy the fundamental architecture of the Zscaler cloudGet to grips with the essential features of ZIA and ZPAFind out how to architect a Zscaler solutionDiscover best practices for deploying and implementing Zscaler solutionsFamiliarize yourself with the tasks involved in the operational maintenance of the Zscaler solutionWho this book is for This book is for security engineers, security architects, security managers, and security operations specialists who may be involved in transitioning to or from Zscaler or want to learn about deployment, implementation, and support of a Zscaler solution. Anyone looking to step into the ever-expanding world of zero-trust network access using the Zscaler solution will also find this book useful.
Publisher: Packt Publishing Ltd
ISBN: 1800567367
Category : Computers
Languages : en
Pages : 236
Book Description
Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users Key FeaturesGet up to speed with Zscaler without the need for expensive trainingImplement Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) security solutions with real-world deploymentsFind out how to choose the right options and features to architect a customized solution with ZscalerBook Description Many organizations are moving away from on-premises solutions to simplify administration and reduce expensive hardware upgrades. This book uses real-world examples of deployments to help you explore Zscaler, an information security platform that offers cloud-based security for both web traffic and private enterprise applications. You'll start by understanding how Zscaler was born in the cloud, how it evolved into a mature product, and how it continues to do so with the addition of sophisticated features that are necessary to stay ahead in today's corporate environment. The book then covers Zscaler Internet Access and Zscaler Private Access architectures in detail, before moving on to show you how to map future security requirements to ZIA features and transition your business applications to ZPA. As you make progress, you'll get to grips with all the essential features needed to architect a customized security solution and support it. Finally, you'll find out how to troubleshoot the newly implemented ZIA and ZPA solutions and make them work efficiently for your enterprise. By the end of this Zscaler book, you'll have developed the skills to design, deploy, implement, and support a customized Zscaler security solution. What you will learnUnderstand the need for Zscaler in the modern enterpriseStudy the fundamental architecture of the Zscaler cloudGet to grips with the essential features of ZIA and ZPAFind out how to architect a Zscaler solutionDiscover best practices for deploying and implementing Zscaler solutionsFamiliarize yourself with the tasks involved in the operational maintenance of the Zscaler solutionWho this book is for This book is for security engineers, security architects, security managers, and security operations specialists who may be involved in transitioning to or from Zscaler or want to learn about deployment, implementation, and support of a Zscaler solution. Anyone looking to step into the ever-expanding world of zero-trust network access using the Zscaler solution will also find this book useful.
Mastering Zendesk
Author: Cedric F. Jacob
Publisher: Packt Publishing Ltd
ISBN: 1786462567
Category : Computers
Languages : en
Pages : 405
Book Description
Master the art of providing effective IT services to your customers by leveraging Zendesk About This Book Deep dive into the functionalities of Zendesk and improve your organization's customer services Learn how to expand the capabilities of Zendesk by integrating and extending it with third-party tools A master level guide that manages tickets, channels, and workflows along with advanced security features Who This Book Is For This book is for proficient Zendesk administrators who want to unlock the full potential of their Zendesk environment by gaining a deeper understanding of Zendesk's advanced customization options. What You Will Learn Customize ticket channels such as Email, Twitter, Facebook, and Web-Widget Add business rules to create a more effective and automated Zendesk environment Use Zendesk apps to add more functionality to the Zendesk setup Extend Zendesk with JIRA and Salesforce Create custom metrics within GoodData in order to set up customized and automated reports Learn how to secure and troubleshoot Zendesk In Detail Zendesk is a cloud-based customer service solution that is widely used because it is easy, efficienct, flexible, and low cost. It is highly scalable and is great for organizations of all sizes. If you're a Zendesk administrator and are looking to explore advanced-level concepts, then this book is for you. It covers the core functionalities such as managing users, groups, and the organization, and creating and adding custom fields. You will learn how to add customized ticket channels to your account. Then, you will focus on customizing business rules and extending Zendesk with JIRA and Salesforce. Towards the end, the book emphasizes security and troubleshooting aspects as well as providing tips and tricks to create a more efficient support environment. By the end of this book, you will be able to turn a basic Zendesk setup into a highly customized working environment. Style and approach This advanced guide provides easy to understand examples to ensure you gain expertise with Zendesk.
Publisher: Packt Publishing Ltd
ISBN: 1786462567
Category : Computers
Languages : en
Pages : 405
Book Description
Master the art of providing effective IT services to your customers by leveraging Zendesk About This Book Deep dive into the functionalities of Zendesk and improve your organization's customer services Learn how to expand the capabilities of Zendesk by integrating and extending it with third-party tools A master level guide that manages tickets, channels, and workflows along with advanced security features Who This Book Is For This book is for proficient Zendesk administrators who want to unlock the full potential of their Zendesk environment by gaining a deeper understanding of Zendesk's advanced customization options. What You Will Learn Customize ticket channels such as Email, Twitter, Facebook, and Web-Widget Add business rules to create a more effective and automated Zendesk environment Use Zendesk apps to add more functionality to the Zendesk setup Extend Zendesk with JIRA and Salesforce Create custom metrics within GoodData in order to set up customized and automated reports Learn how to secure and troubleshoot Zendesk In Detail Zendesk is a cloud-based customer service solution that is widely used because it is easy, efficienct, flexible, and low cost. It is highly scalable and is great for organizations of all sizes. If you're a Zendesk administrator and are looking to explore advanced-level concepts, then this book is for you. It covers the core functionalities such as managing users, groups, and the organization, and creating and adding custom fields. You will learn how to add customized ticket channels to your account. Then, you will focus on customizing business rules and extending Zendesk with JIRA and Salesforce. Towards the end, the book emphasizes security and troubleshooting aspects as well as providing tips and tricks to create a more efficient support environment. By the end of this book, you will be able to turn a basic Zendesk setup into a highly customized working environment. Style and approach This advanced guide provides easy to understand examples to ensure you gain expertise with Zendesk.
Mastering Python Networking
Author: Eric Chou
Publisher: Packt Publishing Ltd
ISBN: 1839218673
Category : Computers
Languages : en
Pages : 577
Book Description
New edition of the bestselling guide to mastering Python Networking, updated to Python 3 and including the latest on network data analysis, Cloud Networking, Ansible 2.8, and new libraries Key FeaturesExplore the power of Python libraries to tackle difficult network problems efficiently and effectively, including pyATS, Nornir, and Ansible 2.8Use Python and Ansible for DevOps, network device automation, DevOps, and software-defined networkingBecome an expert in implementing advanced network-related tasks with Python 3Book Description Networks in your infrastructure set the foundation for how your application can be deployed, maintained, and serviced. Python is the ideal language for network engineers to explore tools that were previously available to systems engineers and application developers. In Mastering Python Networking, Third edition, you'll embark on a Python-based journey to transition from traditional network engineers to network developers ready for the next-generation of networks. This new edition is completely revised and updated to work with Python 3. In addition to new chapters on network data analysis with ELK stack (Elasticsearch, Logstash, Kibana, and Beats) and Azure Cloud Networking, it includes updates on using newer libraries such as pyATS and Nornir, as well as Ansible 2.8. Each chapter is updated with the latest libraries with working examples to ensure compatibility and understanding of the concepts. Starting with a basic overview of Python, the book teaches you how it can interact with both legacy and API-enabled network devices. You will learn to leverage high-level Python packages and frameworks to perform network automation tasks, monitoring, management, and enhanced network security followed by Azure and AWS Cloud networking. Finally, you will use Jenkins for continuous integration as well as testing tools to verify your network. What you will learnUse Python libraries to interact with your networkIntegrate Ansible 2.8 using Python to control Cisco, Juniper, and Arista network devicesLeverage existing Flask web frameworks to construct high-level APIsLearn how to build virtual networks in the AWS & Azure CloudLearn how to use Elastic Stack for network data analysisUnderstand how Jenkins can be used to automatically deploy changes in your networkUse PyTest and Unittest for Test-Driven Network Development in networking engineering with PythonWho this book is for Mastering Python Networking, Third edition is for network engineers, developers, and SREs who want to use Python for network automation, programmability, and data analysis. Basic familiarity with Python programming and networking-related concepts such as Transmission Control Protocol/Internet Protocol (TCP/IP) will be useful.
Publisher: Packt Publishing Ltd
ISBN: 1839218673
Category : Computers
Languages : en
Pages : 577
Book Description
New edition of the bestselling guide to mastering Python Networking, updated to Python 3 and including the latest on network data analysis, Cloud Networking, Ansible 2.8, and new libraries Key FeaturesExplore the power of Python libraries to tackle difficult network problems efficiently and effectively, including pyATS, Nornir, and Ansible 2.8Use Python and Ansible for DevOps, network device automation, DevOps, and software-defined networkingBecome an expert in implementing advanced network-related tasks with Python 3Book Description Networks in your infrastructure set the foundation for how your application can be deployed, maintained, and serviced. Python is the ideal language for network engineers to explore tools that were previously available to systems engineers and application developers. In Mastering Python Networking, Third edition, you'll embark on a Python-based journey to transition from traditional network engineers to network developers ready for the next-generation of networks. This new edition is completely revised and updated to work with Python 3. In addition to new chapters on network data analysis with ELK stack (Elasticsearch, Logstash, Kibana, and Beats) and Azure Cloud Networking, it includes updates on using newer libraries such as pyATS and Nornir, as well as Ansible 2.8. Each chapter is updated with the latest libraries with working examples to ensure compatibility and understanding of the concepts. Starting with a basic overview of Python, the book teaches you how it can interact with both legacy and API-enabled network devices. You will learn to leverage high-level Python packages and frameworks to perform network automation tasks, monitoring, management, and enhanced network security followed by Azure and AWS Cloud networking. Finally, you will use Jenkins for continuous integration as well as testing tools to verify your network. What you will learnUse Python libraries to interact with your networkIntegrate Ansible 2.8 using Python to control Cisco, Juniper, and Arista network devicesLeverage existing Flask web frameworks to construct high-level APIsLearn how to build virtual networks in the AWS & Azure CloudLearn how to use Elastic Stack for network data analysisUnderstand how Jenkins can be used to automatically deploy changes in your networkUse PyTest and Unittest for Test-Driven Network Development in networking engineering with PythonWho this book is for Mastering Python Networking, Third edition is for network engineers, developers, and SREs who want to use Python for network automation, programmability, and data analysis. Basic familiarity with Python programming and networking-related concepts such as Transmission Control Protocol/Internet Protocol (TCP/IP) will be useful.
Palo Alto Cortex XSOAR
Author: Jithin Alex
Publisher:
ISBN:
Category :
Languages : en
Pages : 204
Book Description
Cortex XSOAR is the Security Orchestration, Automation and Response (SOAR) solution from Palo Alto Networks. Cortex XSOAR provides a centralized security orchestration and Automation solution to accelerate incident response and increase analyst productivity. A SOAR platform integrates your organization's security and monitoring tools, helping you centralize, standardize your incident handing processes.This book is a beginner friendly, step by step, practical guide that helps you to understand and learn Palo Alto Cortex XSOAR from scratch. No previous knowledge about the product is required and have explained all the important topics step by step, with screenshots.Covers,1) Solution architecture2) Incident lifecycle in Cortex XSOAR3) Integrations and incident creation4) Playbook development5) Layout customization6) Report creation7) Backup options8) Threat Intel management and EDL integration.9) Introduction to MSSP.
Publisher:
ISBN:
Category :
Languages : en
Pages : 204
Book Description
Cortex XSOAR is the Security Orchestration, Automation and Response (SOAR) solution from Palo Alto Networks. Cortex XSOAR provides a centralized security orchestration and Automation solution to accelerate incident response and increase analyst productivity. A SOAR platform integrates your organization's security and monitoring tools, helping you centralize, standardize your incident handing processes.This book is a beginner friendly, step by step, practical guide that helps you to understand and learn Palo Alto Cortex XSOAR from scratch. No previous knowledge about the product is required and have explained all the important topics step by step, with screenshots.Covers,1) Solution architecture2) Incident lifecycle in Cortex XSOAR3) Integrations and incident creation4) Playbook development5) Layout customization6) Report creation7) Backup options8) Threat Intel management and EDL integration.9) Introduction to MSSP.