Chapter 4. Practices Used to Secure a Corporate Environment

This chapter covers the following topics:

1.0 Threat Management

1.4 Explain the purpose of practices used to secure a corporate environment.

Image Penetration Testing: Discusses the testing process and the rules of engagement.

Image Reverse Engineering: Includes topics such as isolation and sandboxing, authenticity of hardware, and fingerprinting and decomposition of software and malware.

Image Training ...

Get CompTIA Cybersecurity Analyst (CySA+) Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.