O'Reilly logo

CISSP For Dummies, 5th Edition by Peter H. Gregory, Lawrence C. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8

Security Assessment and Testing

In This Chapter

arrow Developing assessment and test strategies

arrow Performing vulnerability assessments, penetration testing, and more

arrow Implementing management and operational controls

arrow Understanding test outputs

arrow Working with auditors

In this chapter, you learn about the various tools and techniques that security professionals use to continually assess and validate an organization’s security environment.

Design and Validate Assessment and Test Strategies

Modern security threats are rapidly and constantly evolving. Likewise, an organization’s systems, applications, networks, services, and users (collectively, these can be thought of as vulnerabilities and risks) are rapidly and constantly evolving. Thus, it is critical that organizations develop an effective strategy to regularly test, evaluate, and adapt their security environment to reduce the risk of successful attacks.

Organizations need to implement a proactive assessment and test strategy for both ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required