Today, to ensure a sufficient level of protection across your entire infrastructure, it is essential to conduct audits. This course aims to illustrate all methods for testing systems with known attacks. Conducting an audit involves rules and limitations that need to be understood. This training describes the different audit methodologies and their specific characteristics. It also presents the essential tools and practical exercises to understand and know how to use them.
Specific Objectives:
- Clearly define an audit and know the existing methods
- Understand the rules and commitments of an audit and its limitations
- Learn about recognized methodologies