In this chapter, we looked at the various prevalent network threats and their concurrent impact on organizations from a day-to-day operational standpoint. We also discussed how security professionals can work toward mitigating each of them and subsequently forming an integrated fortified cyber defense posture for the environment.
Equipped with the information from this chapter, you should now be able to create a comprehensive plan of which threats you need to check for and how to mitigate each of them, as well as how to create a vulnerability management plan and assess the network's secure state and compliance level.
Following this train of thought, in the next chapter, we will take a look at how to conduct network penetration testing and the various industry best practices. We will take a step-by-step approach for practical penetration testing and enable you to perform network penetration testing and document the findings on your own. We will look at the different tools...