Performing a Technical Security Audit and Assessment
Offered By: LinkedIn Learning
Course Description
Overview
Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.
Syllabus
Introduction
- Welcome
- What are technical security assessments?
- Who this course is for
- Develop a technical security assessment methodology
- Overview of technical security assessment techniques
- Select your testing viewpoint
- Challenge: Pick the right technical security assessment
- Solution: Pick the right technical security assessment
- Required skillsets
- Conduct documentation reviews
- Conduct log reviews
- Conduct ruleset reviews
- Conduct system configuration reviews
- Conduct network sniffing
- Network sniffing tool demo: Wireshark
- Conduct file integrity checking
- File integrity checking tool demo
- Challenge: Pick the right reviews
- Solution: Pick the right reviews
- Required skillsets
- Conduct network discovery
- Network discovery tool demo
- Challenge: Install and run Nmap
- Solution: Install and run Nmap
- Identify network ports and services
- Network ports and services discovery tool demo
- Scan for vulnerabilities
- Vulnerability scanning tool demo
- Scan wireless networks
- Required skillsets
- Crack passwords
- Challenge: Install and run a password cracker
- Solution: Install and run a password cracker
- Password cracking tool demo
- Conduct penetration tests
- Penetration testing tool demo
- Conduct social engineering
- Develop a security assessment policy
- Prioritize and schedule the assessments
- Select and customize techniques
- Select the assessors
- Select the location
- Select tools and resources
- Develop the assessment plan
- Challenge: Write a security assessment methodology
- Solution: Write a security assessment methodology
- Legal considerations
- Coordinate the assessment
- Conduct the assessment
- Conduct the analysis
- Challenge: Categorize assessment findings
- Solution: Categorize assessment findings
- Data handling considerations
- Recommend mitigation solutions
- Challenge: Recommend mitigation solutions
- Solution: Recommend mitigation solutions
- Report the results
- Implement remediation and mitigation
- Next steps
Taught by
Marc Menninger
Related Courses
Secure Networked System with Firewall and IDSUniversity of Colorado System via Coursera Introduction to Cyber Security
Uttarakhand Open University, Haldwani via Swayam Preparing for the Google Cloud Professional Data Engineer Exam 日本語版
Google Cloud via Coursera Jump Start: Maestro Hyperscale Network Security
Checkpoint via edX Information Security - Introduction to Information Security
New York University (NYU) via edX