Chapter 8

Security Assessment and Testing

IN THIS CHAPTER

Bullet Designing and validating assessment, test, and audit strategies

Bullet Conducting security control testing

Bullet Collecting security process data

Bullet Analyzing test output and generating reports

Bullet Conducting or facilitating security audits

In this chapter, you learn about the various tools and techniques that security professionals use to continually assess and validate an organization’s IT environment. This domain represents 12 percent of the CISSP certification exam and is composed of the following exam objectives:

  1. 6.1 Design and validate assessment, test, and audit strategies
  2. 6.2 Conduct security control testing
  3. 6.3 Collect security process data
  4. 6.4 Analyze test output and generate report
  5. 6.5 Conduct or facilitate security audits

Design and Validate Assessment, Test, and Audit Strategies

Modern security threats are rapidly and constantly evolving. Likewise, an organization’s systems, applications, networks, services, and users are frequently ...

Get CISSP For Dummies, 8th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.