CISSP®: Security Assessment and Testing

In this course, you build upon the skills learned in previous CISSP domains and learn to put them all to use when validating the effectiveness of your controls.
Course info
Rating
(11)
Level
Intermediate
Updated
October 12, 2016
Duration
2h 3m
Table of contents
Description
Course info
Rating
(11)
Level
Intermediate
Updated
October 12, 2016
Duration
2h 3m
Description

Your controls have been selected and implemented, users have been educated, and everything seems to be in order. Even if this is the case, odds are that there are still unidentified risks in your environment. If you want to be certain that your controls are working as intended, you will need to perform risk assessments and penetration testing. The 6th domain of the CISSP CBK addresses this concern with topics such as information assurance, testing strategies including penetration testing, log reviews, and third party assessment. In this course, CISSP®: Security Assessment and Testing, you build upon the skills learned in previous CISSP domain and learn to put them all to use when validating the effectiveness of your controls. First, you'll learn about security assessment and test strategies. Next, you'll learn about security controls validation, security and related data collection, as well as analyzing test results. Finally, the course will wrap up by covering third-party risk assessments. By the end this course, you should be familiar with a broad spectrum of topics that are covered within the sixth domain of the CISSP.

About the author
About the author

Lee Allen is an adversarial engineer and penetration tester at the Columbus Collaboratory. Lee specializes in Penetration Testing and IT Risk Management and has authored four technical books.

More from the author
Threat Modeling: The Big Picture
Beginner
1h 5m
27 Jun 2017
CISSP® - Security Operations
Intermediate
3h 3m
7 Feb 2017
CISSP® - Security and Risk Management
Beginner
4h 3m
18 Apr 2016
More courses by Lee Allen
Transcript
Transcript

Hi everyone, my name is Lee Allen and welcome to my course "CISSP®: Security Assessment and Testing!"

I am a Certified Information System Security Professional currently employed as Cyber Exploitation Engineer, I have authored 3 books about penetration testing, and am passionate about teaching security related topics.

If you want to be certain that your controls are working as intended, you will need to perform risk assessments and penetration testing. The 6th domain of the CISSP CBK addresses this concern with topics such as information assurance, testing strategies including penetration testing, log reviews, and third party assessment.

Some of the major topics that we will cover include:
1. Security assessment and test strategies
2. Validating Security Controls
3. Collecting security related data
4. Analyzing test results and
5. Third party risk assessments

By the end this course, you should be familiar with a broad spectrum of topics that are covered within the sixth domain of the CISSP.

I hope you’ll join me on this journey to learn the foundational security assessment and testing topics with the "CISSP®: Security Assessment and Testing course," at Pluralsight.