From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Overview of technical security assessment techniques
From the course: Performing a Technical Security Audit and Assessment
Overview of technical security assessment techniques
- There are a wide variety of ways to find out how secure systems and networks are, and they fall into three general categories of techniques, review, target identification and analysis, and target vulnerability validation. Review techniques are often manual examinations of systems, applications, networks, policies, and procedures to ensure they meet minimum security requirements. These techniques include reviewing system and network documentation, firewall and switch rulesets, and system configurations. Conducting network sniffing to examine the current state of the network and using file integrity checking to ensure that key files haven't been modified are also considered review techniques. I'll describe these techniques in the Technical Security Assessment Reviews chapter. Target identification and analysis techniques are used to identify and analyze systems, networks, and security vulnerabilities which may be relevant to the assessment. These techniques are often performed using…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Develop a technical security assessment methodology3m 31s
-
(Locked)
Overview of technical security assessment techniques1m 57s
-
(Locked)
Select your testing viewpoint6m 4s
-
(Locked)
Challenge: Pick the right technical security assessment1m 27s
-
(Locked)
Solution: Pick the right technical security assessment1m 3s
-
-
-
-
-
-
-
-