Conducting Security Assessments

placeholder

Discover enterprise security operations and explore numerous methods for conducting effective security assessments. In this course you will review security assessment methods reconnaissance fingerprinting social engineering and open-source intelligence. Next you will examine routing tables DNS records search engines and security assessment types. You will then consider penetration testing and assessments and look at exercises and audits. Finally you will be introduced to scanners additional security assessment tools and several types of host tools.