Chapter 4. Practices Used to Secure a Corporate Environment
This chapter covers the following topics:
1.0 Threat Management
1.4 Explain the purpose of practices used to secure a corporate environment.
Penetration Testing: Discusses the testing process and the rules of engagement.
Reverse Engineering: Includes topics such as isolation and sandboxing, authenticity of hardware, and fingerprinting and decomposition of software and malware.
Get CompTIA Cybersecurity Analyst (CySA+) Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.