This chapter covers the following topics:
1.0 Threat Management
1.3 Given a network-based threat, implement or recommend the appropriate response and countermeasure.
Network Segmentation: Includes topics such as segmentation and jump boxes.
Honeypots: Discusses the role of honeypots in a layered approach to security.
Endpoint Security: Describes the securing of ...