This chapter covers the following topics:
1.0 Threat Management
1.4 Explain the purpose of practices used to secure a corporate environment.
Penetration Testing: Discusses the testing process and the rules of engagement.
Reverse Engineering: Includes topics such as isolation and sandboxing, authenticity of hardware, and fingerprinting and decomposition of software and malware.