O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Performing Vulnerability Assessments

Managing security means dealing with changing tools, technologies, equipment, and business requirements. Anyone who follows security updates related to viruses, security threats, and other constantly changing aspects of the security landscape understands that managing change and coping with new sources of potential threat or compromise is a never-ending task. Thus, it's entirely reasonable to say that security is as much a matter of regular, rigorous routine as it is a matter of mastering and keeping up with a body of knowledge and skills.

One important aspect of the security routine is sometimes called the “Inverse Golden Rule—namely, do unto yourself before others can do unto you. In less poetic terms, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required