In striving for secure networks, it is important to be able to detect security weaknesses or breaches. This can often be accomplished through the use of assessment tools and techniques, also referred to as management controls. We will examine a number of these tools and techniques so that you have an understanding of some common ways to monitor a network to ensure it is not unnecessarily susceptible to known threats. This section will cover the following topics:
- Vulnerability scanning
- Tools
- Risk calculations
- Assessment types
- Assessment techniques
- Design reviews . . .
The content below this message is for members only.