From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Challenge: Write a security assessment methodology
From the course: Performing a Technical Security Audit and Assessment
Challenge: Write a security assessment methodology
(playful music) - [Instructor] In this chapter, I described why it's important to write a security assessment plan, and I included a template for you to follow in the handouts. Section four of this template is the methodology. Your challenge is to practice writing the methodology of a security assessment plan for a given scenario. Here's the scenario. The assessment will be an external covert test. Refer to my video on selecting your testing viewpoint if you need to review these concepts. Ask yourself how you would conduct this type of assessment and in your methodology, describe the processes you would follow. As far as what to include in your methodology, think about the assessment stages I described in the technical security assessment methodology video. In this section of the security assessment plan, you might mention what you've done or will do in the planning and post execution stages. But in the methodology, you…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Develop a security assessment policy1m 43s
-
(Locked)
Prioritize and schedule the assessments3m 21s
-
(Locked)
Select and customize techniques3m 31s
-
(Locked)
Select the assessors3m 1s
-
(Locked)
Select the location3m 15s
-
(Locked)
Select tools and resources3m 19s
-
(Locked)
Develop the assessment plan2m 34s
-
(Locked)
Challenge: Write a security assessment methodology2m 8s
-
(Locked)
Solution: Write a security assessment methodology1m
-
(Locked)
Legal considerations1m 22s
-
(Locked)
-
-
-