Section 2: Monitoring the Security Infrastructure
In this section, you will gain knowledge of different types of penetration testing and scanning concepts that are crucial to security professionals. You will explore security protocol use cases, understand different network components, and also learn to secure your wireless and mobile solutions.
This section comprises the following chapters:
- Chapter 5, Monitoring, Scanning, and Penetration Testing
- Chapter 6, Understanding Secure and Insecure Protocols
- Chapter 7, Delving into Network and Security Concepts
- Chapter 8, Securing Wireless and Mobile Solutions