From the course: Performing a Technical Security Audit and Assessment
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Challenge: Write a security assessment methodology
From the course: Performing a Technical Security Audit and Assessment
Challenge: Write a security assessment methodology
(upbeat music) - [Instructor] In this chapter, I emphasize the importance of creating a security assessment plan and provided a template for your reference in the handouts. Section 4 of this template is the assessment methodology. Your challenge is to develop a methodology for a security assessment plan for a specific scenario. Here's the scenario. The assessment will be an external covert test. Refer to my video on Selecting Your Testing Viewpoint if you need to review these concepts. Ask yourself how would you conduct this type of assessment? And in your methodology, describe the processes you would follow. When writing your methodology, consider the stages outlined in the Technical Security Assessment Methodology video, particularly focusing on the execution stage. Describe how data will be collected, how security controls will be tested, and the timing of testing activities. Methodologies can be narrative or in bullet points, and there is no set length requirement, but providing…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Develop a security assessment policy1m 10s
-
(Locked)
Prioritize and schedule the assessments2m 7s
-
(Locked)
Select and customize techniques2m 38s
-
(Locked)
Select the assessors1m 36s
-
(Locked)
Select the location1m 42s
-
(Locked)
Select tools and resources1m 33s
-
(Locked)
Develop the assessment plan1m 27s
-
(Locked)
Challenge: Write a security assessment methodology1m 29s
-
(Locked)
Solution: Write a security assessment methodology58s
-
(Locked)
Legal considerations1m 6s
-
(Locked)
-
-
-