From the course: Performing a Technical Security Audit and Assessment (2017)
Unlock the full course today
Join today to access over 22,700 courses taught by industry experts or purchase this course individually.
Challenge: Pick the right reviews
From the course: Performing a Technical Security Audit and Assessment (2017)
Challenge: Pick the right reviews
(lively electronic music) - [Instructor] In this chapter, I covered six review techniques that are useful, when conducting technical security assessments. Your challenge is to select the correct reviews, for a given scenario. In this scenario, imagine there are a set of database servers that are critical to your organization, and the executive leadership want to know if there is any risk that data on these servers could be accidentally damaged. So, you've been asked to determine how susceptible your organization is to data loss on these systems, due to human error. As a reminder, here are the review techniques you can use: documentation review, log review, ruleset review, system configuration review, network sniffing, and file integrity checking. Think about the purpose of each of these types of reviews, and decide which ones you would pick for this scenario. When you're ready, watch the next video, and I'll…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Required skillsets2m 52s
-
(Locked)
Conduct documentation reviews2m 8s
-
(Locked)
Conduct log reviews3m 4s
-
(Locked)
Conduct ruleset reviews2m 57s
-
(Locked)
Conduct system configuration reviews3m 35s
-
(Locked)
Conduct network sniffing1m 43s
-
(Locked)
Network sniffing tool demo: Wireshark3m 21s
-
(Locked)
Conduct file integrity checking4m 55s
-
(Locked)
File integrity checking tool demo1m 18s
-
(Locked)
Challenge: Pick the right reviews1m 6s
-
(Locked)
Solution: Pick the right reviews3m 9s
-
-
-
-
-
-
-