bars
Cisco CyberOps
search
circle-xmark
⌘
Ctrl
k
Home
Certifications
More
ellipsis
chevron-down
copy
Copy
chevron-down
Security Monitoring
Data Types and Uses
Previous
Common Attacks
chevron-left
Next
Concealing the Attack
chevron-right
Last updated
3 years ago
sun-bright
desktop
moon
sun-bright
desktop
moon