From the course: Performing a Technical Security Audit and Assessment (2017)
Unlock the full course today
Join today to access over 22,700 courses taught by industry experts or purchase this course individually.
Solution: Write a security assessment methodology
From the course: Performing a Technical Security Audit and Assessment (2017)
Solution: Write a security assessment methodology
(upbeat music) - [Lecturer] Let's review the key points that a methodology section of a security assessment plan should have and how one might look for a given scenario. This scenario was an external covert test. And your methodology won't look exactly like mine, but it should have at least how the data will be gathered, how the security controls will be tested and when testing will be conducted. Let's take a look at what I wrote for this methodology. I won't read this to you, but I'll point out that I described how the data would be gathered and how the security controls would be tested and when the testing would be conducted. You can pause the video if you want to read through the methodology I wrote. Again, yours doesn't have to look exactly like mine, but you'll want to cover the same key points. You can use this methodology as a model to follow when it comes time to write your next security assessment plan.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Develop a security assessment policy1m 43s
-
(Locked)
Prioritize and schedule the assessments3m 21s
-
(Locked)
Select and customize techniques3m 31s
-
(Locked)
Select the assessors3m 1s
-
(Locked)
Select the location3m 15s
-
(Locked)
Select tools and resources3m 19s
-
(Locked)
Develop the assessment plan2m 34s
-
(Locked)
Challenge: Write a security assessment methodology2m 8s
-
(Locked)
Solution: Write a security assessment methodology1m
-
(Locked)
Legal considerations1m 22s
-
(Locked)
-
-
-