From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Challenge: Pick the right technical security assessment
From the course: Performing a Technical Security Audit and Assessment
Challenge: Pick the right technical security assessment
(upbeat music) - [Lecturer] In this chapter, I described multiple types of security assessments and how they are performed differently depending on the viewpoint selected for the test. Now, let's see if you can choose the right kind of assessment to conduct given two scenarios. In the first scenario, your boss asks you to test how vulnerable your organization is to an attack from an internet-based hacker. To simulate an actual unexpected attack, your boss wants you to run the test without notifying the IT or security staff. Given these requirements, which type of security assessment would you select? Your choices are external or internal and overt or covert. In the next scenario, you have concerns about what information a malicious insider could access without authorization, so you design a test that simulates an attacker inside of your network. You want to partner with your organization's IT and incident…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Develop a technical security assessment methodology3m 31s
-
(Locked)
Overview of technical security assessment techniques1m 57s
-
(Locked)
Select your testing viewpoint6m 4s
-
(Locked)
Challenge: Pick the right technical security assessment1m 27s
-
(Locked)
Solution: Pick the right technical security assessment1m 3s
-
-
-
-
-
-
-
-