From the course: Security Testing Essential Training (2022)
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
The security assessment lifecycle
From the course: Security Testing Essential Training (2022)
The security assessment lifecycle
- [Instructor] When you integrate all five of these assessments into your information security program, you gain a considerable amount of visibility into where you might be most exposed. At the end of the day, that's what security's all about, isn't it? Identifying these exposures and shoring up your defenses before someone or something else can exploit these weaknesses. I'm not sure whether you noticed or not, but these assessments feed one another. If you conduct them in the order that I presented them here, you should notice efficiencies and how much effort it takes to conduct each assessment and, more importantly, in the quality of the assessment deliverables. Start with a risk assessment. Gauge the risk appetite of your leadership and identify the likelihood and impact of the risks most relevant to your organization. Next, conduct a security controls assessment. Take stock of the controls you have in place. Begin…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Language is important2m 16s
-
(Locked)
Risk assessments2m 9s
-
(Locked)
Calculating risk score3m
-
(Locked)
Security controls assessments1m 47s
-
(Locked)
NIST and ISO3m 42s
-
(Locked)
Compliance assessments3m 8s
-
(Locked)
Vulnerability assessments3m 14s
-
(Locked)
Penetration tests2m 8s
-
(Locked)
Goals of a pen test2m 3s
-
(Locked)
The security assessment lifecycle3m 2s
-
-
-
-
-
-
-
-