In this chapter, we looked at common security threats and possible countermeasures and mitigation techniques. We discussed the need for a security baseline for systems within an organization, and looked at a few tools to assist us in measuring the security risk on both the Windows and Linux operating systems. Then, we discussed the various hardening techniques for networking appliances, such as routers and switches, and we closed by learning about hardening mobile devices.
In the next chapter, we will explore building an environment for a lab.