|
|
If you answered two or more questions incorrectly, revisit the materials from the lesson Securing the application layer:
- Video: Application security for infrastructure security management
- Tip: Securing naming and directory services for application defense-in-depth
- Podcast: Top five ways to fix application vulnerabilities without touching the code
If you answered four or more questions correctly, return to SearchSecurity.com's Integration of Networking and Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.
This was first published in February 2010
Security Management Strategies for the CIO