From the course: Performing a Technical Security Audit and Assessment

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Next steps

Next steps

From the course: Performing a Technical Security Audit and Assessment

Start my 1-month free trial

Next steps

- In this course, I've covered the basic methodology for conducting technical security assessments. I've also demonstrated how to use testing tools to conduct network sniffing, vulnerability scanning, and password cracking. Now, you have enough knowledge to get started with your own technical security assessments. The best way to gain the skills and confidence to conduct security assessments is to actually do them. If validating security is part of your job, then it's simply a matter of planning and executing an assessment. Otherwise, you can volunteer or help to shadow a team conducting assessments in your organization. You can also build a virtual network of systems at home and practice conducting security assessments against them on your own time. If you haven't already, I highly recommend watching Malcolm Shore's Introduction to Kali Linux course. He explains how to install and run this important testing platform. If you find you enjoy conducting security assessments, you might…

Contents