LinkedIn Learning – Performing a Technical Security Audit and Assessment
English | Tutorial | Size: 236.40 MB
This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze targets, use key technical testing tools, identify and mitigate findings, and more. Performing technical information security audits and assessments is essential to protecting information assets. By the end of this course, you’ll know how to determine if your network is secure.
Learning Objectives:
• Cite the three phases of external security assessments.
• Explain the reasons for conducting a log review.
• Explain what network sniffing is and why it’s used.
• Describe when to use a file integrity checking tool.
• Differentiate between active network discovery and passive network discovery.
• Explain how to scan for vulnerabilities.
• Relate the three techniques useful for validating target vulnerabilities.
• Explain the four-stage methodology of conducting penetration tests.
RAPIDGATOR:
rapidgator.net/file/7487fc6d066db3d675fa91328dc2c580/LinkedIn_Learning_-_Performing_a_Technical_Security_Audit_and_Assessment.rar.html