Section 2: Security Operations

In this section, you will learn about the many threats that exist for an enterprise, threats that are often highly sophisticated and may be sponsored by state actors. You will learn about the tools and techniques that will enable an enterprise to detect and respond to these threats.

This part of the book comprises the following chapters:

  • Chapter 5, Threat and Vulnerability Management
  • Chapter 6, Vulnerability Assessment and Penetration Testing Methods and Tools
  • Chapter 7, Risk Mitigation Controls
  • Chapter 8, Implementing Incident Response and Forensics Procedures
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.22.68.49