From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Solution: Write a security assessment methodology
From the course: Performing a Technical Security Audit and Assessment
Solution: Write a security assessment methodology
- [Narrator] Let's look at the key components of a methodology section in a security assessment plan and how it might be tailored for a specific scenario. This scenario was an external covert test. Your methodology won't look exactly like mine, but it should have at least how the data will be gathered, how the security controls will be tested, and when testing will be conducted. Here's the way I wrote the methodology. While I won't read this to you, I outlined how data gathering procedures are conducted and security controls are tested, and the timing of testing activities. Remember, your methodology doesn't need to match mine exactly, but it should address these essential elements. You can use this example as a guide when writing your own security assessment plan in the future.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Develop a security assessment policy1m 10s
-
(Locked)
Prioritize and schedule the assessments2m 7s
-
(Locked)
Select and customize techniques2m 38s
-
(Locked)
Select the assessors1m 36s
-
(Locked)
Select the location1m 42s
-
(Locked)
Select tools and resources1m 33s
-
(Locked)
Develop the assessment plan1m 27s
-
(Locked)
Challenge: Write a security assessment methodology1m 29s
-
(Locked)
Solution: Write a security assessment methodology58s
-
(Locked)
Legal considerations1m 6s
-
(Locked)
-
-
-