|
This course provides basic information on security auditing concepts, methods, and applications. It covers several categories of auditing software, including DNS utilities, ping and port scanners, network discovery applications, and enterprise-grade vulnerability scanners.
Objectives:
- Describe the activities of auditors in their various roles, including that of security manager, consultant, and insider
- List and describe the three basic stages of a security audit
- Identify and utilize auditing software, including DNS utilities, ping and port scanners, and enterprise-grade vulnerability scanners
- Classify information revealed during audits
Topics:
- Introduction to auditing
- Auditor roles
- Risk assessment
- Audit stages
- Security scans
- Network discovery applications
- Enterprise-grade audit applications
- Using audit applications
- Social engineering
- Basic audit information
|
P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.
|
Product names mentioned in this catalog may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of a name in this catalog is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between MindLeaders.com, Inc. and the trademark/servicemark proprietor.
Terms of Use:
|
Copyright � 2006 Webteks. All rights reserved.
|
|
|