Security Rules: Rules of Engagement

IT Security    |    Intermediate
  • 14 videos | 47m 25s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 21 users Rating 4.4 of 21 users (21)
Prior to performing any penetration testing, it is important to outline the Rules of Engagement (RoE) with the client. Begin this 14-video course with a general overview of the RoE, how it relates to business, and the potential consequences of not having the RoE in place. Look at benefits of having an easy reference checklist prepared when defining RoE. Learn how to determine the appropriate scope of engagement; examine client (IT staff) considerations; and view common risks and limitations, such as impact on systems. Explore the logistics and considerations such as testing tools, personnel, and test schedules. Delve into incident handling and best practices; testing and best practices, and also best practices in information handling. Examine elements that should be included in final reports, such as action taken, problems, and findings. Look at liabilities, warranty, limitation of a liability, and indemnification considerations to include when outlining the intent of testing activities. Finally, learn how to ensure proper authorization has been granted to commence any testing.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide a general overview of the rules of engagement, how the roe relates to business, and the potential consequences of not having the roe in place
    Provide an overview of the benefits of having a easy reference checklist or templates prepared when defining roe
    Recognize how to determine the appropriate scope of engagement
    Describe client (it staff) considerations such as client contact details and potential impacts on their working environment
    Describe common risks and limitations you should outline such as impact on systems, and ensuring backups are available and the disaster recovery plan is intact
    List key logistical considerations such as testing tools, personnel, and test schedules
  • Describe incident handling best practices such as law enforcement contact, sensitive data/privacy, and encryption
    Describe best practices you should outline in the event that testing is successful or unsuccessful
    Outline best practices to follow or consider when in possession of a company's data, such as encryption and data destruction
    Describe elements that should be included in a final report such as actions taken, problems, and findings
    Describe warranty, limitation of liability, and indemnification considerations to include when outlining the intent of testing activities, as well as and any liability concerns
    Describe how to ensure proper authority has been granted to commence any testing, such as obtaining signatures from key stakeholders
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 57s
  • 1m 38s
    After completing this video, you will be able to provide a general overview of the Rules of Engagement, how the ROE relates to business, and the potential consequences of not having the ROE in place. FREE ACCESS
  • Locked
    3.  Reference Checklist
    3m 39s
    After completing this video, you will be able to provide an overview of the benefits of having a easy reference checklist or templates prepared when defining RoE. FREE ACCESS
  • Locked
    4.  Scope of Engagement
    3m 39s
    Upon completion of this video, you will be able to recognize how to determine the appropriate level of engagement. FREE ACCESS
  • Locked
    5.  Client Considerations
    3m 6s
    Upon completion of this video, you will be able to describe client considerations such as client contact details and potential impacts on their working environment. FREE ACCESS
  • Locked
    6.  Risks and Limitations
    3m 46s
    After completing this video, you will be able to describe common risks and limitations you should outline, such as impact on systems, and ensuring backups are available and the disaster recovery plan is intact. FREE ACCESS
  • Locked
    7.  Logistics
    5m 1s
    After completing this video, you will be able to list key logistical considerations such as testing tools, personnel, and test schedules. FREE ACCESS
  • Locked
    8.  Incident Handling
    4m 15s
    Upon completion of this video, you will be able to describe incident handling best practices such as law enforcement contact, sensitive data/privacy, and encryption. FREE ACCESS
  • Locked
    9.  Testing
    3m 56s
    Upon completion of this video, you will be able to describe best practices you should outline for successful and unsuccessful testing. FREE ACCESS
  • Locked
    10.  Information Handling
    6m 27s
    In this video, you will learn how to outline best practices to follow or consider when in possession of a company's data, such as encryption and data destruction. FREE ACCESS
  • Locked
    11.  Reporting
    3m 7s
    Upon completion of this video, you will be able to describe elements that should be included in a final report, such as actions taken, problems, and findings. FREE ACCESS
  • Locked
    12.  Liabilities
    3m 38s
    After completing this video, you will be able to describe warranty, limitation of liability, and indemnification considerations to include when outlining the intent of testing activities, as well as any liability concerns. FREE ACCESS
  • Locked
    13.  Granting Authorization for Testing
    1m 55s
    Upon completion of this video, you will be able to describe how to ensure proper authority has been granted to commence any testing, such as obtaining signatures from key stakeholders. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 22s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.2 of 189 users Rating 4.2 of 189 users (189)
Rating 4.6 of 2777 users Rating 4.6 of 2777 users (2777)
Rating 4.6 of 181 users Rating 4.6 of 181 users (181)