Logo


1. External Penetration Testing
  1. Penetration Testing of Windows

  2. Self-testing Security

  3. Laptop Hacking

2. Enterprise Penetration Testing
  1. Penetration Testing of your VPN

  2. Domain Controller Penetration Testing

  3. Tools; Metasploit

  4. Choosing a penetration Testing Supplier

3. CISCO Penetration Testing
  1. CISCO Penetration Testing

  2. Scan & Fingerprint

  3. Credentials Guessing

  4. Connect

  5. Vulnerability Assessment

  6. Further your attack

  7. CISCO Command Refference

A critical step to ensure that your project is a success is in choosing which supplier to use.

As an absolute fundamental when choosing a security partner, first eliminate the supplier who provided the systems that will be tested. To use them will create a conflict of interest (will they really tell you that they deployed the systems insecurely, or quietly ignore some issues).

Detailed below are some questions that you might want to ask your potential security partner:

  • Is security assessment their core business?
  • How long have they been providing security assessment services?
  • Do they offer a range of services that can be tailored to your specific needs?
  • Are they vendor independent (do they have NDAs with vendors that prevent them passing information to you)?
  • Do they perform their own research, or are they dependent on out-of-date information that is placed in the public domain by others?
  • What are their consultant’s credentials?
  • How experienced are the proposed testing team (how long have they been testing, and what is their background and age)?
  • Do they hold professional certifications, such as PCI, CISSP, CISA, and CHECK?
  • Are they recognized contributors within the security industry (white papers, advisories, public speakers etc)?
  • Are the CVs available for the team that will be working on your project?
  • How would the supplier approach the project?
  • Do they have a standardized methodology that meets and exceeds the common ones, such as OSSTMM, CHECK and OWASP?
  • Can you get access to a sample report to assess the output (is it something you could give to your executives; do they communicate the business issues in a non-technical manner)?
  • What is their policy on confidentiality?
  • Do they outsource or use contractors?
  • Are references available from satisfied customers in the same industry sector?
  • Is there a legal agreement that will protect you from negligence on behalf of the supplier?
  • Does the supplier maintain sufficient insurance cover to protect your organization?

To receive your Penetration Test , please submit your payment of $99.00


Business Name:
Contact Information:
Email Address:
URL or IP address:
  

Other members of our business group:
Cloud-Security.us | Wind-power-pro.com | Photo-modeling.com | US-scada.com

COPYRIGHT (C) 2000 - 2011 InfoSecPro.com ALL RIGHTS RESERVED