O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

This chapter has covered foundational concepts in security assessment and testing strategies. Designing and validating security assessment and test strategies are important parts of the security profession. Conducting security tests provides information about vulnerabilities in the systems and can also be used to test the effectiveness of security controls. Depending on the type of IT asset, a suitable test method has to be adopted. Vulnerability assessment and penetration tests are generally conducted on networks and servers. Software tests including load tests and code reviews are conducted on application programs.

Continued in the next chapter are topics in this domain pertaining to the collection analysis of security test data, which ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required