CISSP Central

CISSP Domain6 Section 2


Listen Later

6.2 Conduct Security Control Testing

  • 6.2.1 Vulnerability Assessment
  • 6.2.2 Penetration Testing
  • 6.2.3 Log Reviews
  • 6.2.4 Synthetic Transaction
  • 6.2.5 Code review and testing
  • 6.2.6 Misuse case testing
  • 6.2.7 Coverage analysis
  • 6.2.8 Interface Testing
  • 6.2.9 Breach attack simulations (BAS)
  • 6.2.10 Compliance checks

...more
View all episodesView all episodes
Download on the App Store

CISSP CentralBy Krishnakumar Mahadevan