Introduction
Understanding technical security audits and assessments
()
What are technical security assessments?
()
Who this course is for
()
1. Overview of Technical Security Assessments
Develop a technical security assessment methodology
()
Overview of technical security assessment techniques
()
Select your testing viewpoint
()
Challenge: Pick the right technical security assessment
()
Solution: Pick the right technical security assessment
()
2. Conduct Technical Security Reviews
Baseline skill sets for security reviews
()
Conduct documentation reviews
()
Conduct log reviews
()
Conduct ruleset reviews
()
Conduct system configuration reviews
()
Conduct network sniffing
()
Network sniffing tool demo: Wireshark
()
Conduct file integrity checking
()
File integrity checking tool demo
()
Challenge: Pick the right reviews
()
Solution: Pick the right reviews
()
3. Identify and Analyze Targets
Baseline skill sets target identification and analysis
()
Conduct network discovery
()
Network discovery tool demo
()
Challenge: Install and run Nmap
()
Solution: Install and run Nmap
()
Identify network ports and services
()
Network ports and services discovery tool demo
()
Scan for vulnerabilities
()
Vulnerability scanning tool demo
()
Scan wireless networks
()
4. Validate Target Vulnerabilities
Baseline skill sets for target vulnerability validation
()
Crack passwords
()
Password cracking tool demo
()
Challenge: Install and run a password cracker
()
Solution: Install and run a password cracker
()
Conduct penetration tests
()
Penetration testing tool demo
()
Conduct social engineering
()
5. Planning Technical Security Assessments
Develop a security assessment policy
()
Prioritize and schedule the assessments
()
Select and customize techniques
()
Select the assessors
()
Select the location
()
Select tools and resources
()
Develop the assessment plan
()
Challenge: Write a security assessment methodology
()
Solution: Write a security assessment methodology
()
Legal considerations
()
6. Executing the Technical Security Assessment
Coordinate the assessment
()
Conduct the assessment
()
Conduct the analysis
()
Challenge: Categorize assessment findings
()
Solution: Categorize assessment findings
()
Data handling considerations
()
7. Post-Testing Activities
Recommend mitigation actions
()
Challenge: Recommend mitigation actions
()
Solution: Recommend mitigation actions
()
Report the results
()
Implement remediation and mitigation
()
Conclusion
Begin your testing journey
()
Ex_Files_Technical_Security_Audit_Assessment.zip
(200 KB)