top of page
hmlogo_edited_edited.jpg

Professional Cyber Security Test Planning

About The Course

Every company is faced with having security testing performed using third party security test partners who specialize in testing, but might not know much about your business. So what makes a good test, what questions are to be considered and what do you do with the results? This course will teach you how to do your own critical thinking without having to be a cyber security expert, how to ask the right questions to your security testing partners, how to scope and find the trade-offs between time, budget and relevant threat scenarios. Suitable for security coordinators and project managers, but also security testers themselves.

Calendar Pages

Syllabus

  • Introduction

  • Testing process

  • Initial Consultation

  • Objectives & Compliance

  • Risk Assessment & Threat Modeling

  • Test Strategy & Scope Planning

  • Designing Test Cases & Scenarios

  • Resource & Environment Preparation

  • Project Management

  • Test Execution & Monitoring

  • Reporting & Analysis

  • Post-Test Review

  • Q & A

Video Game

In this course you will learn

Communication

Get introduced to the world of cyber security, risk and testing approaches.

Threat Modeling

Learn how to focus on what matters for your business and not just "top critical vulnerabilities" open to interpretation.

Execution

Learn what to expect during and after a security test and when to escalate.

Reporting

Learn how to read the results, find what is missing and how to coordinate the remediation process.

Office

Who is this course for?

This course is perfect for anyone coordinating, ordering, compiling requirements or generally involved in security testing with internal testing departments or external testing partners.

Location

On site or remote

Max. Attendees

10

Language

English

Duration

1/2 day (3,5h)

Course Details

Your Instructor

A cyber security industry authority and ethical hacker with over 23 years of authentic cyber security consultancy - at your service.

point.jpg

Tom Van de Wiele

Ethical Hacker | Lead Advisor | Founder Hacker Minded

bottom of page