Security Rules: Rules of Engagement
IT Security
| Intermediate
- 14 videos | 47m 25s
- Includes Assessment
- Earns a Badge
Prior to performing any penetration testing, it is important to outline the Rules of Engagement (RoE) with the client. Begin this 14-video course with a general overview of the RoE, how it relates to business, and the potential consequences of not having the RoE in place. Look at benefits of having an easy reference checklist prepared when defining RoE. Learn how to determine the appropriate scope of engagement; examine client (IT staff) considerations; and view common risks and limitations, such as impact on systems. Explore the logistics and considerations such as testing tools, personnel, and test schedules. Delve into incident handling and best practices; testing and best practices, and also best practices in information handling. Examine elements that should be included in final reports, such as action taken, problems, and findings. Look at liabilities, warranty, limitation of a liability, and indemnification considerations to include when outlining the intent of testing activities. Finally, learn how to ensure proper authorization has been granted to commence any testing.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide a general overview of the rules of engagement, how the roe relates to business, and the potential consequences of not having the roe in placeProvide an overview of the benefits of having a easy reference checklist or templates prepared when defining roeRecognize how to determine the appropriate scope of engagementDescribe client (it staff) considerations such as client contact details and potential impacts on their working environmentDescribe common risks and limitations you should outline such as impact on systems, and ensuring backups are available and the disaster recovery plan is intactList key logistical considerations such as testing tools, personnel, and test schedules
-
Describe incident handling best practices such as law enforcement contact, sensitive data/privacy, and encryptionDescribe best practices you should outline in the event that testing is successful or unsuccessfulOutline best practices to follow or consider when in possession of a company's data, such as encryption and data destructionDescribe elements that should be included in a final report such as actions taken, problems, and findingsDescribe warranty, limitation of liability, and indemnification considerations to include when outlining the intent of testing activities, as well as and any liability concernsDescribe how to ensure proper authority has been granted to commence any testing, such as obtaining signatures from key stakeholdersSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 57s
-
1m 38sAfter completing this video, you will be able to provide a general overview of the Rules of Engagement, how the ROE relates to business, and the potential consequences of not having the ROE in place. FREE ACCESS
-
3m 39sAfter completing this video, you will be able to provide an overview of the benefits of having a easy reference checklist or templates prepared when defining RoE. FREE ACCESS
-
3m 39sUpon completion of this video, you will be able to recognize how to determine the appropriate level of engagement. FREE ACCESS
-
3m 6sUpon completion of this video, you will be able to describe client considerations such as client contact details and potential impacts on their working environment. FREE ACCESS
-
3m 46sAfter completing this video, you will be able to describe common risks and limitations you should outline, such as impact on systems, and ensuring backups are available and the disaster recovery plan is intact. FREE ACCESS
-
5m 1sAfter completing this video, you will be able to list key logistical considerations such as testing tools, personnel, and test schedules. FREE ACCESS
-
4m 15sUpon completion of this video, you will be able to describe incident handling best practices such as law enforcement contact, sensitive data/privacy, and encryption. FREE ACCESS
-
3m 56sUpon completion of this video, you will be able to describe best practices you should outline for successful and unsuccessful testing. FREE ACCESS
-
6m 27sIn this video, you will learn how to outline best practices to follow or consider when in possession of a company's data, such as encryption and data destruction. FREE ACCESS
-
3m 7sUpon completion of this video, you will be able to describe elements that should be included in a final report, such as actions taken, problems, and findings. FREE ACCESS
-
3m 38sAfter completing this video, you will be able to describe warranty, limitation of liability, and indemnification considerations to include when outlining the intent of testing activities, as well as any liability concerns. FREE ACCESS
-
1m 55sUpon completion of this video, you will be able to describe how to ensure proper authority has been granted to commence any testing, such as obtaining signatures from key stakeholders. FREE ACCESS
-
1m 22s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.