From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Solution: Pick the right technical security assessment
From the course: Performing a Technical Security Audit and Assessment
Solution: Pick the right technical security assessment
(upbeat music) - [Instructor] Let's see if you selected the correct security assessments for the scenarios. In the first scenario, because you're testing how vulnerable your organization is to an internet-based hacker, you'd want to conduct an external assessment. This means that you'll test the strength of your organization's perimeter defenses. And since this security assessment will be done without the knowledge of the IT or security staff, that makes this a covert task. In the second scenario, simulating a malicious insider means that this will be an internal security assessment. You'll focus on testing internal systems for vulnerabilities, and by giving advance notification to your organization's IT and incident response teams, that makes this an overt task. The next time you need to conduct a security assessment, you can compare it to these scenarios to help you decide which type of assessment is best.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Develop a technical security assessment methodology3m 31s
-
(Locked)
Overview of technical security assessment techniques1m 57s
-
(Locked)
Select your testing viewpoint6m 4s
-
(Locked)
Challenge: Pick the right technical security assessment1m 27s
-
(Locked)
Solution: Pick the right technical security assessment1m 3s
-
-
-
-
-
-
-
-