From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Select and customize techniques
From the course: Performing a Technical Security Audit and Assessment
Select and customize techniques
- [Instructor] An important part of planning technical security assessments is selecting and customizing which testing techniques will be used. The objectives of the assessment will heavily influence technique selection. For example, assessing systems for vulnerabilities differs from conducting a PCI compliance audit. Assessments can be approached from various viewpoints. For instance, social engineering is a more appropriate technique for a covert assessment, and log reviews are often part of overt tests. Resource availability, such as time and funding, also plays a role. If resources are limited, quick vulnerability scans make more sense than expensive, time-consuming penetration tests. Finally, the risk to the target could drive technique selection. Less intrusive methods, like security configuration reviews, may be preferred over more invasive techniques, like penetration tests, to avoid potential service disruptions. Let's look at two testing scenarios to determine the most…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Develop a security assessment policy1m 10s
-
(Locked)
Prioritize and schedule the assessments2m 7s
-
(Locked)
Select and customize techniques2m 38s
-
(Locked)
Select the assessors1m 36s
-
(Locked)
Select the location1m 42s
-
(Locked)
Select tools and resources1m 33s
-
(Locked)
Develop the assessment plan1m 27s
-
(Locked)
Challenge: Write a security assessment methodology1m 29s
-
(Locked)
Solution: Write a security assessment methodology58s
-
(Locked)
Legal considerations1m 6s
-
(Locked)
-
-
-