Netadmins perform network security testing to assess and verify the threats and vulnerabilities of their network. This chapter introduces you to the following tools and methodologies of security testing:
Linux-based live CD
The topics covered in this chapter require you to be familiar with the mechanics of the Transmission Control Protocol/Internet Protocol (TCP/IP) model, with reference to the seven layers of the Open System Interconnection (OSI) reference model.
Network security is an ongoing process that is best described by the Cisco security wheel. The security wheel, as shown in Figure 7-1, consists of the following four ...