Chapter 12. Tools of the Trade

“The happy people are those who are producing something; the bored people are those who are consuming much and producing nothing.”

—William Ralph Inge

By the end of this chapter, you should know and be able to explain the following:

• The fundamental types of attacks that your network might experience

• How to conduct or contract a security assessment of your network’s security

• How to use the results from a security scan and vulnerability assessment to better secure your network

• How to conduct or contract a penetration test of your network’s security

Answering these key questions will enable you to understand the overall characteristics and importance of network security. By the time you finish this book, you ...

Get Network Security First-Step, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.