From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Select tools and resources
From the course: Performing a Technical Security Audit and Assessment
Select tools and resources
- When planning a technical security assessment, determining which tools and resources to use will be an important consideration. The tools and resources which get selected will depend on the testing techniques being used in the assessment. For instance, if vulnerability scanning is one of the testing techniques, then the assessment team may select OpenVAS for the scanning tool. If the assessment team is a third party, or made up of traveling assessors, the primary testing platforms may be robust laptops built to handle the processing and memory requirements of all the necessary tools and operating systems. Internal assessors may have dedicated testing servers and appliances staged within the organization's network to centrally execute and manage security assessments. Whenever using technical testing tools and software, it's important to keep them current with the latest versions and malware or vulnerability signatures if necessary. Prior to conducting any security tests, the…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Develop a security assessment policy1m 43s
-
(Locked)
Prioritize and schedule the assessments3m 21s
-
(Locked)
Select and customize techniques3m 31s
-
(Locked)
Select the assessors3m 1s
-
(Locked)
Select the location3m 15s
-
(Locked)
Select tools and resources3m 19s
-
(Locked)
Develop the assessment plan2m 34s
-
(Locked)
Challenge: Write a security assessment methodology2m 8s
-
(Locked)
Solution: Write a security assessment methodology1m
-
(Locked)
Legal considerations1m 22s
-
(Locked)
-
-
-