Understanding System Hardening
Testing the Effectiveness of System Hardening Mechanisms
Authentication and Authorization
The Relationship Between Authentication and Authorization
Testing the Effectiveness of Authentication and Authorization Mechanisms
Testing the Effectiveness of Common Encryption Mechanisms
Firewalls and Network Zones
Testing Firewall Effectiveness
Understanding Intrusion Detection Tools
Testing the Effectiveness of Intrusion Detection Tools
Understanding Malware Scanning Tools
Testing the Effectiveness of Malware Scanning Tools
Understanding Data Obfuscation
Testing the Effectiveness of Data Obfuscation Approaches
The Importance of Security Training
How to Test the Effectiveness of Security Training