Chapter Objectives
After reading this chapter and completing the exercises, you will be able to do the following:
Understand how to secure a system
Probe a system for vulnerabilities
Use vulnerability scanning tools
Evaluate potential security consultants
At this point, it should ...
No credit card required