Главная
Study mode:
on
1
Introduction
2
Security Assessment Levels
3
External Vulnerability Testing
4
Proven Methodology
5
Security Assessments Process
6
Field Work
7
Technical Report
8
Outbrief
9
PostAssessment Report
10
Vulnerablity Assessment
11
Vulnerability Management
12
Compliance
13
Other Considerations
14
Conclusion
15
Questions
Description:
Learn about security vulnerability assessments in this 43-minute conference talk from Derbycon 2012. Explore various assessment levels, external vulnerability testing, proven methodologies, and the comprehensive security assessment process. Gain insights into field work techniques, technical reporting, outbriefing, and post-assessment procedures. Delve into vulnerability management, compliance considerations, and other crucial aspects of conducting thorough security evaluations. Enhance your understanding of best practices and processes for identifying and addressing potential security weaknesses in systems and networks.

Security Vulnerability Assessments - Process and Best Practices

Add to list
0:00 / 0:00