PART IIITechnical Defenses
Chapters 7 through 10 focus on technical defenses. Technical defenses include any software, hardware, or firmware you can deploy in your cyber defense to fight threats. The best defense is one that prevents threats from reaching end users so they aren't exposed to hackers and their tricks. Technical defenses are also great at automation and doing their defensive tactics at scale and with speed. Chapter 7 examines three global anti-phishing standards: DMARC, SPF, and DKIM. Chapter 8 discusses network and server defenses, and Chapter 9 explores endpoint defenses against social engineering and phishing. Chapter 10 covers advanced and miscellaneous defenses not presented in the previous three chapters. The idea is that you'll be exposed to a broad range of possible technical defenses and might take away a few new ones you didn't previously consider as providing a defense against social engineering and phishing.