June 2018
Intermediate to advanced
294 pages
7h 5m
English
I hope that you enjoyed this chapter, I know that it did not contain some exciting hacking commands, but you should know about the Pre-Engagement phase if you're going to be working in this field.
Let's summarize what you have learned in this chapter:
In the next chapter, you will learn about Application Threat Modeling, which is, for me, one of the pillars of a successful application security mandate.