Chapter 9

Security in the Life

This chapter covers the following topics and corresponding proficiencies:

  • System hardening: Describe the requirements and methods of configuring systems, including establishing baselines, to protect them from potential threats.

  • Logging and monitoring: Describe the tools and processes that check the status of key components of an IT infrastructure.

  • Acceptable Use Policy: Understand the purpose of this general policy and describe the concepts it communicates to users in an organization.

  • Bring Your Own Device Policy: Understand the purpose of this general policy and describe the concepts it communicates to users in an organization.

  • Change Management Policy: Understand the purpose of this general policy and describe ...

Get CC Certified in Cybersecurity Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.