CompTIA PenTest+: Scoping an Engagement

Intermediate
  • 10 videos | 55m 18s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 19 users Rating 4.6 of 19 users (19)
How far does a security test need to go? This course shows you how to set the scope of a security penetration test. Begin by identifying security assessment types, how to select security targets, and how to determine the testing scope strategy. Next, you will determine who tests the security and learn how to confirm their test methods. Discover how to review the test outcome to determine the level of acceptable risks, risk impacts, and risk treatments. Learn how to avoid scope creep with clients, and identify threat actors and agents. Conclude by aligning tests to regulations and standards, such as PCI DSS, FISMA, MARS-E, HIPAA, SOX, and ISO.

WHAT YOU WILL LEARN

  • Compare types of assessments
    Define special scoping factors
    Select targets
    Strategize scoping
    Explain risk acceptance and impact tolerance
  • Describe scheduling and scope creep
    Explain threat actors and threat agents
    Describe compliance-based assessments and caveats
    Base objectives on regulations
    Describe engagement scoping and compliance testing

IN THIS COURSE

  • 6m 3s
    Find out how to compare types of assessments. FREE ACCESS
  • 6m 30s
    In this video, you will learn how to identify special scoping factors. FREE ACCESS
  • Locked
    3.  Target Selection
    7m 5s
    During this video, you will learn how to select targets. FREE ACCESS
  • Locked
    4.  Scoping Strategy
    9m 9s
    Learn how to scope strategically. FREE ACCESS
  • Locked
    5.  Risk acceptance and Tolerance to Impact
    8m 39s
    After completing this video, you will be able to explain risk acceptance and impact tolerance. FREE ACCESS
  • Locked
    6.  Scheduling and Scope Creep
    4m 52s
    Upon completion of this video, you will be able to describe scheduling and scope creep. FREE ACCESS
  • Locked
    7.  Threat Actors and Threat Agents
    5m 21s
    After completing this video, you will be able to explain threat actors and threat agents. FREE ACCESS
  • Locked
    8.  Compliance-Based Assessments and Limitations
    3m 9s
    After completing this video, you will be able to describe compliance-based assessments and their caveats. FREE ACCESS
  • Locked
    9.  Basing Objectives on Regulations
    2m 20s
    In this video, you will learn how to base objectives on regulations. FREE ACCESS
  • Locked
    10.  Exercise: Describe Engagement Scoping and Compliance
    2m 10s
    After completing this video, you will be able to describe engagement scoping and compliance testing. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 6 users Rating 5.0 of 6 users (6)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 16 users Rating 4.6 of 16 users (16)
Rating 4.8 of 66 users Rating 4.8 of 66 users (66)
Rating 4.5 of 356 users Rating 4.5 of 356 users (356)