From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Select tools and resources
From the course: Performing a Technical Security Audit and Assessment
Select tools and resources
- [Narrator] Selecting the appropriate tools and resources is critical when planning a technical security assessment. These choices depend on the testing techniques being used in the assessment. For example, vulnerability scanning may require tools like OpenVAS. For third party or traveling assessors. Robust laptops are often the primary testing platforms. While internal assessors may use dedicated servers within the organization's network. Keeping testing tools up to date with the latest versions and patches is essential, as is ensuring operating systems are patched and running only necessary services. Before conducting any tests, different tools may require specific operating systems. For instance, Linux is standard for tools like Legion and OpenVAS, so security assessors may prefer a special purpose testing system like Kali Linux. Other testing tools will require Windows. Virtual machines offer flexibility and independence from the host system. Leveraging VMs allows assessors to…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Develop a security assessment policy1m 10s
-
(Locked)
Prioritize and schedule the assessments2m 7s
-
(Locked)
Select and customize techniques2m 38s
-
(Locked)
Select the assessors1m 36s
-
(Locked)
Select the location1m 42s
-
(Locked)
Select tools and resources1m 33s
-
(Locked)
Develop the assessment plan1m 27s
-
(Locked)
Challenge: Write a security assessment methodology1m 29s
-
(Locked)
Solution: Write a security assessment methodology58s
-
(Locked)
Legal considerations1m 6s
-
(Locked)
-
-
-