Summary
In this chapter, you learned all about users, including how they can impact your defensive security strategy, their vulnerabilities, and the plurality of attacks aimed at them, but also all the tactics that you can apply to mitigate those risks.
This chapter is extremely important because by securing this attack vector, you will exponentially reduce the scope of the attacks against your infrastructure, systems, and data.
Now, get ready for the next exciting chapter in which we will take a deep dive into more technical stuff. In the following chapter, you will learn about the best penetration testing tools, forensics, networking, and many other technologies that you need to master in order to create the best defensive security strategy.