From the course: Performing a Technical Security Audit and Assessment

Unlock the full course today

Join today to access over 24,800 courses taught by industry experts.

Select your testing viewpoint

Select your testing viewpoint

- [Instructor] There are various perspectives to consider when conducting technical security assessments. Each viewpoint will influence the testing methodologies and techniques you use. The testing viewpoints we'll explore are external and internal and overt and covert. External testing is done outside your organization's network and physical security perimeter, simulating external threats. It focuses on vulnerabilities that might allow penetration of your perimeter defenses, granting access to internal systems and sensitive data. External security assessments generally follow three phases, reconnaissance, enumeration, and testing. Reconnaissance techniques involve researching publicly available information about a target, such as domain registry data, to gather relevant details that might help conduct tests and uncover potential vulnerabilities. Following reconnaissance, the enumeration phase identifies the systems, services, ports, and other elements within the scope of the…

Contents