From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Select your testing viewpoint
From the course: Performing a Technical Security Audit and Assessment
Select your testing viewpoint
- [Instructor] There are various perspectives to consider when conducting technical security assessments. Each viewpoint will influence the testing methodologies and techniques you use. The testing viewpoints we'll explore are external and internal and overt and covert. External testing is done outside your organization's network and physical security perimeter, simulating external threats. It focuses on vulnerabilities that might allow penetration of your perimeter defenses, granting access to internal systems and sensitive data. External security assessments generally follow three phases, reconnaissance, enumeration, and testing. Reconnaissance techniques involve researching publicly available information about a target, such as domain registry data, to gather relevant details that might help conduct tests and uncover potential vulnerabilities. Following reconnaissance, the enumeration phase identifies the systems, services, ports, and other elements within the scope of the…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
(Locked)
Develop a technical security assessment methodology2m 54s
-
Overview of technical security assessment techniques1m 31s
-
(Locked)
Select your testing viewpoint4m 5s
-
(Locked)
Challenge: Pick the right technical security assessment1m 9s
-
(Locked)
Solution: Pick the right technical security assessment54s
-
(Locked)
-
-
-
-
-
-
-