Section 3: Security Engineering and Cryptography
In this section, you will learn how to deploy various controls to protect enterprise data and systems. You will learn how to protect end devices using a variety of different technologies and learn the importance of cryptography and PKI when protecting enterprise data.
This part of the book comprises the following chapters:
- Chapter 9, Enterprise Mobility and Endpoint Security Controls
- Chapter 10, Security Considerations Impacting Specific Sectors and Operational Technologies
- Chapter 11, Implementing Cryptographic Protocols and Algorithms
- Chapter 12, Implementing Appropriate PKI Solutions, Cryptographic Protocols, and Algorithms for Business Needs