From the course: Performing a Technical Security Audit and Assessment (2017)

Unlock the full course today

Join today to access over 22,700 courses taught by industry experts or purchase this course individually.

Solution: Write a security assessment methodology

Solution: Write a security assessment methodology

From the course: Performing a Technical Security Audit and Assessment (2017)

Start my 1-month free trial

Solution: Write a security assessment methodology

(upbeat music) - [Lecturer] Let's review the key points that a methodology section of a security assessment plan should have and how one might look for a given scenario. This scenario was an external covert test. And your methodology won't look exactly like mine, but it should have at least how the data will be gathered, how the security controls will be tested and when testing will be conducted. Let's take a look at what I wrote for this methodology. I won't read this to you, but I'll point out that I described how the data would be gathered and how the security controls would be tested and when the testing would be conducted. You can pause the video if you want to read through the methodology I wrote. Again, yours doesn't have to look exactly like mine, but you'll want to cover the same key points. You can use this methodology as a model to follow when it comes time to write your next security assessment plan.

Contents