O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction

The final chapter of this book focuses on the task of managing security. Different chapters have focused on different areas of the network. We have introduced and discussed hardware, software, protocols, and processes used to deploy and configure security for modern networks and facilities. This chapter strives to identify ways to make all these security components work together to achieve a long-term security configuration. Like any modern business process, security requires constant maintenance and management to work properly. Deploying security is really only half the battle, though. You also have to manage and adjust your security system on a constant basis.

Companies today often deploy systems and processes in a piecemeal fashion, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required