YoVDO

Security Vulnerability Assessments - Process and Best Practices

Offered By: YouTube

Tags

Vulnerability Management Courses Network Security Courses Penetration Testing Courses Compliance Courses Risk Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about security vulnerability assessments in this 43-minute conference talk from Derbycon 2012. Explore various assessment levels, external vulnerability testing, proven methodologies, and the comprehensive security assessment process. Gain insights into field work techniques, technical reporting, outbriefing, and post-assessment procedures. Delve into vulnerability management, compliance considerations, and other crucial aspects of conducting thorough security evaluations. Enhance your understanding of best practices and processes for identifying and addressing potential security weaknesses in systems and networks.

Syllabus

Introduction
Security Assessment Levels
External Vulnerability Testing
Proven Methodology
Security Assessments Process
Field Work
Technical Report
Outbrief
PostAssessment Report
Vulnerablity Assessment
Vulnerability Management
Compliance
Other Considerations
Conclusion
Questions


Related Courses

Designing and Executing Information Security Strategies
University of Washington via Coursera
Caries Management by Risk Assessment (CAMBRA)
University of California, San Francisco via Coursera
Diagnosing the Financial Health of a Business
Macquarie Graduate School of Management via Open2Study
Enfermedades transfronterizas de los animales
Miríadax
Unethical Decision Making in Organizations
University of Lausanne via Coursera