Security Vulnerability Assessments - Process and Best Practices
Offered By: YouTube
Course Description
Overview
Learn about security vulnerability assessments in this 43-minute conference talk from Derbycon 2012. Explore various assessment levels, external vulnerability testing, proven methodologies, and the comprehensive security assessment process. Gain insights into field work techniques, technical reporting, outbriefing, and post-assessment procedures. Delve into vulnerability management, compliance considerations, and other crucial aspects of conducting thorough security evaluations. Enhance your understanding of best practices and processes for identifying and addressing potential security weaknesses in systems and networks.
Syllabus
Introduction
Security Assessment Levels
External Vulnerability Testing
Proven Methodology
Security Assessments Process
Field Work
Technical Report
Outbrief
PostAssessment Report
Vulnerablity Assessment
Vulnerability Management
Compliance
Other Considerations
Conclusion
Questions
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity