Chapter 1, Understanding Security Fundamentals, covers some security fundamentals that will be expanded upon in later chapters.
Chapter 2, Conducting Risk Analysis, looks at the types of threats and vulnerabilities, and at the roles that different threat actors play.
Chapter 3, Implementing Security Policies and Procedures, looks at reference architectures, different guides, and how best to dispose of data.
Chapter 4, Delving into Identity and Access Management, looks at different types of authentication and how to dispose of data. We will first look at the concepts of identity and access management.
Chapter 5, Understanding Network Components, examines networking components and how they could affect the security of ...