Security Control Assessment
The Security Professional must be able to assess the effectiveness of security controls to mitigate risk. This course will help you understand many types of security testing and equip you to lead and support test programs.
What you'll learn
Security assessment is an important but often misunderstood integral part of an information security management program. Many tests and audits fail to provide value or adequate insight into security risk and controls. In this course, Security Control Assessment, you will learn the various types of security assessments that should be conducted. First, you will explore the topic of designing an assessment strategy. Next, you will discover the skills and approaches to use to conduct effective testing. Finally, you will gain an understanding of security audits, log monitoring, and reporting results to management. When you are finished with this course, you will have the skills and knowledge of security assessment and testing needed to provide and assess an information security management program.
Table of contents
- Security Control Assessment Introduction 10m
- Testing and Assessment of Information and Information Systems: Part Two 7m
- Testing and Assessment of Information and Information Systems: Part Three 7m
- Testing and Assessment of Information and Information Systems: Part Four 7m
- Log Management: Part One 6m
- Log Management: Part Two 7m
- Honey Nets 7m
- Penetration Testing: Part One 6m
- Penetration Testing: Part Two 9m
- Penetration Testing: Part Three 9m
- Vulnerability Assessment: Part One 6m
- Vulnerability Assessment: Part Two 6m
- Penetration Testing: Part Four 7m
- Penetration Testing: Part Five 7m
- Conducting a Penetration Test 9m
- Other Test Areas: Part One 10m
- Other Test Areas: Part Two 9m