Enrolment options

This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze targets, use key technical testing tools, identify and mitigate findings, and more. Performing technical information security audits and assessments is essential to protecting information assets. By the end of this course, you'll know how to determine if your network is secure.

Topics include
  • Cite the three phases of external security assessments.
  • Explain the reasons for conducting a log review.
  • Explain what network sniffing is and why it’s used.
  • Describe when to use a file integrity checking tool.
  • Differentiate between active network discovery and passive network discovery.
  • Explain how to scan for vulnerabilities.
  • Relate the three techniques useful for validating target vulnerabilities.
  • Explain the four-stage methodology of conducting penetration tests.

Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in.

Guests cannot access this course. Please log in.