From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Solution: Pick the right technical security assessment
From the course: Performing a Technical Security Audit and Assessment
Solution: Pick the right technical security assessment
(upbeat instrumental music) - [Instructor] Let's check if you made the right choices for the scenarios. In the first scenario where the goal is to assess vulnerability to an internet-based hacker attack, you should conduct an external assessment. This involves testing your organization's perimeter defenses, and since this security assessment will be done without notifying the IT or security staff, it falls under the category of covert testing. In the second scenario, simulating a malicious insider, and internal security assessment is what you should choose. Here the focus is on testing internal systems for vulnerabilities and providing advanced notice to your organization's IT, and incident response teams makes it an overt test. The next time you need to conduct a security assessment, you can refer to these scenarios to guide you in selecting the most suitable type of assessment.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
(Locked)
Develop a technical security assessment methodology2m 54s
-
Overview of technical security assessment techniques1m 31s
-
(Locked)
Select your testing viewpoint4m 5s
-
(Locked)
Challenge: Pick the right technical security assessment1m 9s
-
(Locked)
Solution: Pick the right technical security assessment54s
-
(Locked)
-
-
-
-
-
-
-