


Practical risk analysis and hardening lies somewhere in between these two extremes. Risk analysis involves identifying what you care about and the threats to these assets, hardening is about how to protect your assets.Ī risk analysis and hardening process can range in character from the highly formalized (acronym soup, pseudo-mathematical formulas) to the very casual and informal (just a group of techs talking about "cool hacks" over beers and how they should "do something" about it). Learning to see your network through the eyes of your adversaries is an important part of the risk analysis and hardening process. Immediately apply the skills and techniques learned in SANS courses, ranges, and summits
