Lynda – Performing a Technical Security Audit and Assessment

Lynda – Performing a Technical Security Audit and Assessment
English | Size: 632.03 MB
Category: CBTs

This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze targets, use key technical testing tools, identify and mitigate findings, and more. Performing technical information security audits and assessments is essential to protecting information assets. By the end of this course, you’ll know how to determine if your network is secure.
[Read more…]

Pluralsight – Performing and Analyzing Network Reconnaissance

Pluralsight – Performing and Analyzing Network Reconnaissance
English | Size: 1.10 GB
Category: Tutorial

Seeing what is currently being exposed about your networks and company resources is vital. This course will provide a fundamental understanding of both reconnaissance and scanning and how it can affect your security posture.
You’ve been tasked as an "Incident Handler" and you are wondering where you start. Attackers typically start with doing a little "reconnaissance" of their target, so it only makes sense that you start there as well. In this course, Performing and Analyzing Network Reconnaissance, you will learn how to think like an attacker in order to stay a step ahead of one. First, you will learn about the two different steps of reconnaissance and scanning. Next, you will learn what to look for, how it’s done, and what you can do to protect your infrastructures.
[Read more…]

Pluralsight – Performing OSINT Gathering on Corporate Targets

Pluralsight – Performing OSINT Gathering on Corporate Targets
English | Size: 804.10 MB
Category: CBTs

Open Source Intelligence (OSINT) gathering is a critical component of penetration testing. This course will teach you how to gather various forms of corporate OSINT, including physical, logical, org chart, electronic, infrastructure, and financial.
While many organizations are focusing their resources on implementing internal security controls, few turn their attention to the open source intelligence (OSINT) that attackers exploit in an effort to circumvent those controls. In this course, Performing OSINT Gathering on Corporate Targets, you’ll learn foundational knowledge of gathering various forms of corporate OSINT as part of a penetration test. First, you’ll explore tools and techniques for collecting OSINT. [Read more…]