Knowing all these threats are out there is merely one-half of solving the threats and vulnerabilities equation. The other half is knowing how to test your network for vulnerabilities. This section will cover the following topics:
- Penetration testing
- Vulnerability scanning
- Black box
- White box
- Gray box
A properly configured network in terms of accessibility is a good thing. A properly configured network in terms of security is a priceless asset every company hopes to have. It is possible to test your network and see . . .
The content below this message is for members only.