Practical Security Assessments
Practical Security Assessments
In today's complex security landscape, it's not enough for infosec teams to set firewall rules and IDSs and hope for the best. Organizations need to have a clear understanding of their threat landscape, what data and systems they're protecting, where the data resides, which assets are most valuable, and how to fine tune defensive controls as the threats, and the company's focus, change. To make this all happen, security professionals must continually test and assess their network and applications through a combination of manual and automated techniques to ensure the controls are working properly and delivering actionable alerts. The old adage, "You cannot manage what you do not measure" is truer now than ever.
In this 2 day class, attendees will learn and practice hands-on, real-world assessment techniques. From working with vulnerability scanners to ensuring compliance to industry standards, attendees will explore the techniques and procedures followed by effective security professionals. Some of the highlights will include learning how to weed out false positives and catch false negatives, mapping the network and assets then using the map to identify system vulnerabilities, and testing authorizations and permissions. At the completion of this course, security pros will be able ensure for their organizations a comprehensive, ongoing security assessment practice.
This course is available on-site at your location, or offered through open enrollment in Orlando,FL, and San Francisco,CA.
- Standards & Guidelines, PCI, HIPAA, OWASP, Other;
- Testing Methodology Overview
- Test Lab & Class Targets
- Preparation, Integrating within the business/development processes, Scoping the assessment, Gathering the Data, Ensuring permissions, Preventing issues while assessing
- Network Assessments, Mapping network and systems assets; Realtime detection of assets; Integrating with monitoring systems; Scanning for assets, Testing systems and services; Automated techniques for finding vulnerabilities; Nessus and OpenVAS usage and tuning; Building custom scripts for testing the systems, Evaluating assessments results; Determining and removing false positives; Tuning your testing techniques to prevent false negatives; Assessing an organization's results based on industry standards
- Application Assessments, Mapping applications and systems assets; Realtime detection of assets; Integrating with monitoring systems; Scanning for assets; Working within developer SDLC processes; Assessing Cloud-based systems, Testing systems and services; Automated techniques for finding vulnerabilities; Performing application assessments against business applications; Performing assessments against web services, Evaluating assessments results; Determining and removing false positives; Tuning your testing techniques to prevent false negatives; Assessing an organization's results based
- Student Real-World Scavenger Hunt Challenge
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.