This guide offers mid-level IT engineers the practical tips they need to use the best open source or low cost tools available to harden their IT infrastructure. It demonstrates how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks. It provides a vetted "security testing by example" style to demonstrate best practices and minimize false positive testing and it focuses on real world implementation and testing.