This course is part of our series on the CIS Top 18 Critical Security Controls v8, and covers Control 18: Penetration Testing. The primary objectives of this control are to distinguish between penetration testing and vulnerability assessment and to grasp the concepts of red teaming and its distinctiveness.
Learning Objectives
By the end of this course, you should be able to:
Understand the Significance of Software Asset Knowledge
Recognize the Risks Associated with Unauthorized and Unmanaged Software Assets
Identify the Various Methods and Sources for Software Asset Discovery
Understand the Link Between Software Asset Management and Incident Response
Grasp the Procedures for Managing Unauthorized Software Assets and Ensuring Regular Software Inventory Updates
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):