An Introduction to Cyber Assessments

Designed to provide an understanding to participants on the difference between Vulnerability Assessment, Penetration Testing, Ethical Hacking, Auditing and Threat Hunting.

An Introduction to Cyber Assessments

About this session

Ever wondered on how to measure and test a business resiliency to cyber security? Have you ever assessed the soundness of your company’s posture to information security?

There are a number of Cyber Assessments that can be considered for such an exercise. We have designed this  course to bridge the gap and provide an understanding to participants on what is the difference between these different assessment types. Here you will learn about:

  • Vulnerability Assessments;
  • Threat Hunting;
  • Penetration Testing;
  • Ethical Hacking; and
  • IS Auditing.

You will learn how each of these assessments is conducted and what each one entails.  You will be able to discern which assessment is most suitable for which outcome.

The course will explore the benefits of each assessment. We will suggested some tools for certain types of assessments and discuss good practices in terms of frequency of application. Moreover you will gain some useful understanding on what is best done in-house and when you should outsource.

Target Audience

Designed for employee levels. Recommended for employees in IT teams, internal audit and finance. A useful training for employees in management positions.

Session Duration

2 hours

Session Outcomes

By the end of this course you will have a good grasp of each type of assessment. You will be able to understand better what assessment to use in what circumstance.

Introduction to Cyber Assessments – Course Description

Download Course Content Here
Contact Us for A Quote