It is a common belief that the use of commercial vulnerability scanning tools is all that is required to determine whether an IT infrastructure is secure. Unfortunately, due to the evolving nature of Internet-based malicious input, this is no longer true. This book explains how an effective security testing strategy can be implemented to protect an IT infrastructure from internal or external attack. Details of testing techniques, such as assessments, penetration tests, anticipating security breeches, and formats for preparing reports at the conclusion of testing are all covered. In addition, the text helps prepare IT security management professionals for the Certified Ethical Hacker Exam.