0% found this document useful (0 votes)
5 views2 pages

CONDUCT SECURITY ASSESSMENT AND TESTING - Unit Outline

CONDUCT SECURITY ASSESSMENT AND TESTING - Unit Outline

Uploaded by

otienockim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views2 pages

CONDUCT SECURITY ASSESSMENT AND TESTING - Unit Outline

CONDUCT SECURITY ASSESSMENT AND TESTING - Unit Outline

Uploaded by

otienockim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CONDUCT SECURITY ASSESSMENT AND TESTING

Unit Outline

This unit focuses on the key skills you need to carry out a cybersecurity assessment and testing. You’ll learn
how to gather information about an organization and its systems, scan and map networks, identify and list
resources, test for known vulnerabilities, use social engineering techniques, and finally prepare a clear security
assessment and testing report.

# Topic title Subtopics & learning points


1.1 Explain the importance of reconnaissance on a target system, network, or
organization
1.2 Identify different types of reconnaissance:
Gather information • 1.2.1 Active;
1. about organization • 1.2.2 Passive
and its systems 1.3 Use OSINT (Open-Source Intelligence) tools to collect publicly available data
1.4 Demonstrate the use of WHOIS lookup, DNS enumeration, and Google Dorking
1.5 Utilise tools like Maltego, the Harvester, and Shodan for information gathering
1.6 Analyse email header and metadata for intelligence gathering
2.1 Understand the purpose of network scanning for security, troubleshooting, and
optimization
2.2 Differentiate between various types of scans:
• 2.2.1 ping scan;
• 2.2.2 SYN scan;
Scan and map the
2. • 2.2.3 TCP scan;
network
• 2.2.4 UDP scan
2.3 Use Nmap to discover live hosts, open ports, and services
2.4 Perform vulnerability scans:
2.4.1 Nessus;
2.4.2 OpenVAS2.5 Interpret scan results to identify potential security gaps
3.1 Enumerate Target Resources
3.2 Define enumeration and its role in cybersecurity and networking
3.3 Conduct enumeration:
• 3.3.1 File transfer enumeration;
Enumerate target • 3.3.2 DNS enumeration;
3.
resources • 3.3.3 SMTP enumeration;
• 3.3.4 Website enumeration;
• 3.3.5 Remote connection enumeration
3.4 Perform LDAP and NetBIOS enumeration for directory services
3.5 Identify misconfigurations that could lead to privilege escalation
4.1 Use Metasploit Framework to exploit system vulnerabilities
4.2 Demonstrate privilege escalation techniques on Windows and Linux systems
4.3 Perform buffer overflow attacks and analyse the results
Exploit known 4.4 Execute web-based attacks:
4.
vulnerabilities
• 4.4.1 SQL Injections;
• 4.4.2 XSS;
• 4.4.3 CSRF
# Topic title Subtopics & learning points

5.1 Define social engineering


5.2 Identify different types of social engineering attacks
5.3 Analyse case studies of real-world social engineering attacks
Perform social
5. 5.4 Conduct SET (Social-Engineer Toolkit):
engineering
• 5.4.1 Craft phishing emails
5.5 Develop security awareness strategies to counter social engineering threats
5.6 Understand ethical configurations and legal aspects of social engineering tests
6.1 Explain the concept and objectives of system hacking in cybersecurity and IT
system management
6.2 Demonstrate operating system exploitation techniques:
• 6.2.1 privilege escalation;
• 6.2.2 buffer overflow;
• 6.2.3 kernel vulnerabilities
6.3 Utilise password cracking tools:
• 6.3.1 brute force; 6.3.2 dictionary;
• 6.3.3 rainbow table attacks
6.4 Analyse hacking tools and frameworks to assess system vulnerabilities:
Conduct system 6.4.1 Metasploit
6. 6.5 Deploy keylogging and spyware techniques to capture user credentials and monitor
hacking
system activity
6.6 Execute pivoting techniques to move laterally within a compromised network and
escalate access privileges
6.7 Apply methods for covering tracks:
• 6.7.1 log manipulation;
• 6.7.2 anti-forensics techniques;
• 6.7.3 rootkits6.8 Implement system hacking countermeasures to mitigate
threats:
6.8.1 intrusion detection;
6.8.2 endpoint protection
6.9 Patch management
7.1 Explain the significance of assessment and testing reports
7.2 Document vulnerabilities and their impact based on CVSS scores
7.3 Structure a professional security assessment report with findings and
recommendations
Prepare security 7.4 Utilise automated reporting tools in assessment and testing
7. assessment and testing 7.5 Develop remediation strategies based on industry best practice:
report
• 7.5.1 OWASP;
• 7.5.2 NIST;
• 7.5.3 ISO 270017.6 Present security findings to technical and non-technical
stakeholders

You might also like