CINXE.COM

Performing a Technical Security Audit and Assessment Online Class | LinkedIn Learning, formerly Lynda.com

<!DOCTYPE html> <html lang="en"> <head> <meta name="pageKey" content="d_learning_course_guest"> <!----><!----> <meta name="locale" content="en_US"> <meta id="config" data-app-version="2.0.2343" data-call-tree-id="AAYuUVccLvy0MR8Zjtx7Hw==" data-multiproduct-name="learning-guest-frontend" data-service-name="learning-guest-frontend" data-browser-id="241741d4-5899-4525-8530-072924747298" data-enable-page-view-heartbeat-tracking data-page-instance="urn:li:page:learning_course_guest;tJ0VMvXxQdaQQOwlhkUVvQ==" data-disable-jsbeacon-pagekey-suffix="false" data-member-id="0" data-dna-member-lix-treatment="control" data-human-member-lix-treatment="control" data-dfp-member-lix-treatment="control"> <link rel="canonical" href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807"> <!----><!----> <!----> <!----> <!----> <link rel="manifest" href="/homepage-guest/manifest.json" crossorigin="use-credentials"> <!----> <script> function getDfd() {let yFn,nFn;const p=new Promise(function(y, n){yFn=y;nFn=n;});p.resolve=yFn;p.reject=nFn;return p;} window.lazyloader = getDfd(); window.tracking = getDfd(); window.impressionTracking = getDfd(); window.ingraphTracking = getDfd(); window.appDetection = getDfd(); window.pemTracking = getDfd(); </script> <!----> <link rel="icon" href="https://static.licdn.com/aero-v1/sc/h/444zstxv7s91nepfm5et6ofge"> <title>Performing a Technical Security Audit and Assessment Online Class | LinkedIn Learning, formerly Lynda.com</title> <meta name="robots" content="noarchive, max-image-preview:large"> <meta name="description" content="Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews."> <meta property="og:site_name" content="LinkedIn"> <meta name="twitter:site" content="@LI_Learning"> <meta name="twitter:card" content="summary"> <meta name="litmsProfileName" content="learning-guest-frontend"> <meta property="og:title" content="Performing a Technical Security Audit and Assessment Online Class | LinkedIn Learning, formerly Lynda.com"> <meta name="twitter:title" content="Performing a Technical Security Audit and Assessment Online Class | LinkedIn Learning, formerly Lynda.com"> <meta property="og:description" content="Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews."> <meta name="twitter:description" content="Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews."> <meta property="og:image" content="https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&amp;v=beta&amp;t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q"> <meta name="twitter:image" content="https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&amp;v=beta&amp;t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q"> <!----> <meta property="og:url" content="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807"> <meta property="og:type" content="website"> <meta name="clientSideIngraphs" content="1" data-gauge-metric-endpoint="/learning-guest/api/ingraphs/gauge" data-counter-metric-endpoint="/learning-guest/api/ingraphs/counter"> <link rel="stylesheet" href="https://static.licdn.com/aero-v1/sc/h/bhnsb9vw0f84m4sarx55jrypn"> <script type="application/ld+json"> {"@context":"http://schema.org/","@type":"Course","provider":{"@type":"Organization","name":"LinkedIn Learning","url":"https://www.linkedin.com/learning/"},"publisher":{"@type":"Organization","name":"LinkedIn Learning","url":"https://www.linkedin.com/learning/"},"hasCourseInstance":{"@type":"CourseInstance","courseMode":"online","courseWorkload":"PT1H54M24S","instructor":[{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"}]},"inLanguage":"en","name":"Performing a Technical Security Audit and Assessment","offers":[{"@type":"Offer","category":"Subscription"},{"@type":"Offer","category":"Paid","price":"40.36","priceCurrency":"SGD"}],"description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","image":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","creator":[{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"}],"author":[{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"}],"dateCreated":"2024-05-20","datePublished":"2024-05-20","thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","timeRequired":"PT1H54M24S","totalHistoricalEnrollment":5348,"url":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807","about":[{"@type":"Thing","url":"https://www.linkedin.com/learning/search?keywords=IT+Security+Assessments","name":"IT Security Assessments"},{"@type":"Thing","url":"https://www.linkedin.com/learning/search?keywords=Security+Audits","name":"Security Audits"}],"hasPart":[[{"@type":"VideoObject","name":"Understanding technical security audits and assessments - Introduction","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT44S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":false,"isAccessibleForFree":true,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/understanding-technical-security-audits-and-assessments"},{"@type":"VideoObject","name":"What are technical security assessments? - Introduction","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M18S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":false,"isAccessibleForFree":true,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/what-are-technical-security-assessments"},{"@type":"VideoObject","name":"Who this course is for - Introduction","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT51S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":false,"isAccessibleForFree":true,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/who-this-course-is-for"}],[{"@type":"VideoObject","name":"Develop a technical security assessment methodology - 1. Overview of Technical Security Assessments","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M54S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/develop-a-technical-security-assessment-methodology"},{"@type":"VideoObject","name":"Overview of technical security assessment techniques - 1. Overview of Technical Security Assessments","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M31S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":false,"isAccessibleForFree":true,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/overview-of-technical-security-assessment-techniques"},{"@type":"VideoObject","name":"Select your testing viewpoint - 1. Overview of Technical Security Assessments","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT4M5S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/select-your-testing-viewpoint"},{"@type":"VideoObject","name":"Challenge: Pick the right technical security assessment - 1. Overview of Technical Security Assessments","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M9S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/challenge-pick-the-right-technical-security-assessment"},{"@type":"VideoObject","name":"Solution: Pick the right technical security assessment - 1. Overview of Technical Security Assessments","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT54S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/solution-pick-the-right-technical-security-assessment"}],[{"@type":"VideoObject","name":"Baseline skill sets for security reviews - 2. Conduct Technical Security Reviews","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M21S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":false,"isAccessibleForFree":true,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/baseline-skill-sets-for-security-reviews"},{"@type":"VideoObject","name":"Conduct documentation reviews - 2. Conduct Technical Security Reviews","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M58S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-documentation-reviews"},{"@type":"VideoObject","name":"Conduct log reviews - 2. Conduct Technical Security Reviews","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M8S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-log-reviews"},{"@type":"VideoObject","name":"Conduct ruleset reviews - 2. Conduct Technical Security Reviews","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M18S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-ruleset-reviews"},{"@type":"VideoObject","name":"Conduct system configuration reviews - 2. Conduct Technical Security Reviews","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M51S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-system-configuration-reviews"},{"@type":"VideoObject","name":"Conduct network sniffing - 2. Conduct Technical Security Reviews","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M19S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-network-sniffing"},{"@type":"VideoObject","name":"Network sniffing tool demo: Wireshark - 2. Conduct Technical Security Reviews","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M16S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/network-sniffing-tool-demo-wireshark"},{"@type":"VideoObject","name":"Conduct file integrity checking - 2. Conduct Technical Security Reviews","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M39S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-file-integrity-checking"},{"@type":"VideoObject","name":"File integrity checking tool demo - 2. Conduct Technical Security Reviews","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M21S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":false,"isAccessibleForFree":true,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/file-integrity-checking-tool-demo"},{"@type":"VideoObject","name":"Challenge: Pick the right reviews - 2. Conduct Technical Security Reviews","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M6S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/challenge-pick-the-right-reviews"},{"@type":"VideoObject","name":"Solution: Pick the right reviews - 2. Conduct Technical Security Reviews","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M37S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/solution-pick-the-right-reviews"}],[{"@type":"VideoObject","name":"Baseline skill sets target identification and analysis - 3. Identify and Analyze Targets","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M22S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/baseline-skill-sets-target-identification-and-analysis"},{"@type":"VideoObject","name":"Conduct network discovery - 3. Identify and Analyze Targets","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M25S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-network-discovery"},{"@type":"VideoObject","name":"Network discovery tool demo - 3. Identify and Analyze Targets","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M43S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/network-discovery-tool-demo"},{"@type":"VideoObject","name":"Challenge: Install and run Nmap - 3. Identify and Analyze Targets","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT52S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/challenge-install-and-run-nmap"},{"@type":"VideoObject","name":"Solution: Install and run Nmap - 3. Identify and Analyze Targets","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M25S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/solution-install-and-run-nmap"},{"@type":"VideoObject","name":"Identify network ports and services - 3. Identify and Analyze Targets","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M49S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/identify-network-ports-and-services"},{"@type":"VideoObject","name":"Network ports and services discovery tool demo - 3. Identify and Analyze Targets","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT3M13S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/network-ports-and-services-discovery-tool-demo"},{"@type":"VideoObject","name":"Scan for vulnerabilities - 3. Identify and Analyze Targets","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT3M40S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/scan-for-vulnerabilities"},{"@type":"VideoObject","name":"Vulnerability scanning tool demo - 3. Identify and Analyze Targets","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT3M17S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/vulnerability-scanning-tool-demo"},{"@type":"VideoObject","name":"Scan wireless networks - 3. Identify and Analyze Targets","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT4M5S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/scan-wireless-networks"}],[{"@type":"VideoObject","name":"Baseline skill sets for target vulnerability validation - 4. Validate Target Vulnerabilities","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT49S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/baseline-skill-sets-for-target-vulnerability-validation"},{"@type":"VideoObject","name":"Crack passwords - 4. Validate Target Vulnerabilities","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M53S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/crack-passwords"},{"@type":"VideoObject","name":"Password cracking tool demo - 4. Validate Target Vulnerabilities","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT3M23S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":false,"isAccessibleForFree":true,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/password-cracking-tool-demo"},{"@type":"VideoObject","name":"Challenge: Install and run a password cracker - 4. Validate Target Vulnerabilities","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M3S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/challenge-install-and-run-a-password-cracker"},{"@type":"VideoObject","name":"Solution: Install and run a password cracker - 4. Validate Target Vulnerabilities","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M27S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/solution-install-and-run-a-password-cracker"},{"@type":"VideoObject","name":"Conduct penetration tests - 4. Validate Target Vulnerabilities","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT3M3S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-penetration-tests"},{"@type":"VideoObject","name":"Penetration testing tool demo - 4. Validate Target Vulnerabilities","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M46S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/penetration-testing-tool-demo"},{"@type":"VideoObject","name":"Conduct social engineering - 4. Validate Target Vulnerabilities","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M15S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-social-engineering"}],[{"@type":"VideoObject","name":"Develop a security assessment policy - 5. Planning Technical Security Assessments","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M10S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/develop-a-security-assessment-policy"},{"@type":"VideoObject","name":"Prioritize and schedule the assessments - 5. Planning Technical Security Assessments","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M7S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/prioritize-and-schedule-the-assessments"},{"@type":"VideoObject","name":"Select and customize techniques - 5. Planning Technical Security Assessments","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M38S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/select-and-customize-techniques"},{"@type":"VideoObject","name":"Select the assessors - 5. Planning Technical Security Assessments","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M36S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/select-the-assessors"},{"@type":"VideoObject","name":"Select the location - 5. Planning Technical Security Assessments","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M42S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/select-the-location"},{"@type":"VideoObject","name":"Select tools and resources - 5. Planning Technical Security Assessments","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M33S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/select-tools-and-resources"},{"@type":"VideoObject","name":"Develop the assessment plan - 5. Planning Technical Security Assessments","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M27S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/develop-the-assessment-plan"},{"@type":"VideoObject","name":"Challenge: Write a security assessment methodology - 5. Planning Technical Security Assessments","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M29S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/challenge-write-a-security-assessment-methodology"},{"@type":"VideoObject","name":"Solution: Write a security assessment methodology - 5. Planning Technical Security Assessments","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT58S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/solution-write-a-security-assessment-methodology"},{"@type":"VideoObject","name":"Legal considerations - 5. Planning Technical Security Assessments","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M6S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/legal-considerations"}],[{"@type":"VideoObject","name":"Coordinate the assessment - 6. Executing the Technical Security Assessment","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M31S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/coordinate-the-assessment"},{"@type":"VideoObject","name":"Conduct the assessment - 6. Executing the Technical Security Assessment","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M19S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-the-assessment"},{"@type":"VideoObject","name":"Conduct the analysis - 6. Executing the Technical Security Assessment","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M17S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-the-analysis"},{"@type":"VideoObject","name":"Challenge: Categorize assessment findings - 6. Executing the Technical Security Assessment","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M42S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/challenge-categorize-assessment-findings"},{"@type":"VideoObject","name":"Solution: Categorize assessment findings - 6. Executing the Technical Security Assessment","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT2M23S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/solution-categorize-assessment-findings"},{"@type":"VideoObject","name":"Data handling considerations - 6. Executing the Technical Security Assessment","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M17S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/data-handling-considerations"}],[{"@type":"VideoObject","name":"Recommend mitigation actions - 7. Post-Testing Activities","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M15S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/recommend-mitigation-actions"},{"@type":"VideoObject","name":"Challenge: Recommend mitigation actions - 7. Post-Testing Activities","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M5S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/challenge-recommend-mitigation-actions"},{"@type":"VideoObject","name":"Solution: Recommend mitigation actions - 7. Post-Testing Activities","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M59S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/solution-recommend-mitigation-actions"},{"@type":"VideoObject","name":"Report the results - 7. Post-Testing Activities","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M24S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/report-the-results"},{"@type":"VideoObject","name":"Implement remediation and mitigation - 7. Post-Testing Activities","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT1M51S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/implement-remediation-and-mitigation"}],[{"@type":"VideoObject","name":"Begin your testing journey - Conclusion","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT45S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":true,"isAccessibleForFree":false,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/begin-your-testing-journey"}]],"syllabusSections":[{"@type":"Syllabus","name":"Understanding technical security audits and assessments","timeRequired":"PT44S","description":"Learn that this course covers the essential steps for planning and conducting technical security assessments, analyzing assessment results to identify network vulnerabilities, and formulating effective mitigation strategies. Discover practical testing techniques for evaluating system and network security, all aligned with NIST Special Publication 800-115."},{"@type":"Syllabus","name":"What are technical security assessments?","timeRequired":"PT1M18S","description":"Learn the purpose and importance of technical security assessments in determining the security posture of a system, network, or organization. Understand how these assessments identify security weaknesses and compliance with standards, and why they are a critical component of a security strategy."},{"@type":"Syllabus","name":"Who this course is for","timeRequired":"PT51S","description":"Learn that this course is tailored for IT professionals, particularly those preparing for an upcoming security audit. Understand the course's focus on system and network security which requires a basic knowledge of networking concepts such as TCP/IP, IP addressing, subnetting, and the functions of key network devices."},{"@type":"Syllabus","name":"Develop a technical security assessment methodology","timeRequired":"PT2M54S","description":"Learn how to create a structured methodology for conducting technical security assessments based on NIST standards. Gain insights into tailoring this methodology to address specific network environments and regulatory requirements. Learn how to effectively integrate various assessment techniques, ensuring a comprehensive evaluation of your network's security posture."},{"@type":"Syllabus","name":"Overview of technical security assessment techniques","timeRequired":"PT1M31S","description":"Learn about the three general categories of techniques used in testing the security of systems and networks. Gain insight into the distinctions between review, target identification and analysis, and target vulnerability validation techniques. Learn which testing techniques are manual and which ones can be automated."},{"@type":"Syllabus","name":"Select your testing viewpoint","timeRequired":"PT4M5S","description":"Learn about the various viewpoints assessors can adopt during technical security assessments. Gain insights into four common testing viewpoints: internal, external, overt, and covert. Discover the distinct testing techniques associated with these viewpoints, which are instrumental in shaping the overall testing methodology."},{"@type":"Syllabus","name":"Challenge: Pick the right technical security assessment","timeRequired":"PT1M9S","description":"Marc Menninger challenges you to apply what you've learned in this chapter to see if you can pick the right technical security assessment for a given scenario. Learn how different types of technical security assessments can be used in different scenarios."},{"@type":"Syllabus","name":"Solution: Pick the right technical security assessment","timeRequired":"PT54S","description":"Marc Menninger shares his solution for the type of technical security assessment he would pick for the given scenario. Use this information to help you select the correct type of technical security assessment in the future."},{"@type":"Syllabus","name":"Baseline skill sets for security reviews","timeRequired":"PT2M21S","description":"Learn six key techniques for conducting technical security assessment reviews. Understand the baseline skill sets required for each technique. Gain insights into the importance of these reviews in identifying security gaps and gathering information to facilitate security tests."},{"@type":"Syllabus","name":"Conduct documentation reviews","timeRequired":"PT1M58S","description":"Learn the purpose of documentation reviews in performing technical security assessments. Discover techniques for conducting thorough documentation reviews. Learn how to interpret and evaluate various types of security documentation to ensure comprehensive assessment coverage."},{"@type":"Syllabus","name":"Conduct log reviews","timeRequired":"PT2M8S","description":"Learn the process of conducting log reviews. Understand why log reviews are an important part of any technical security assessment, and discover techniques for effectively analyzing log data to identify security incidents, compliance issues, and potential vulnerabilities."},{"@type":"Syllabus","name":"Conduct ruleset reviews","timeRequired":"PT2M18S","description":"Learn the process of conducting ruleset reviews. Gain insights into analyzing firewall and switch rulesets to identify potential security gaps and compliance issues. Discover how ruleset reviews help determine how traffic flows through an organization’s network and how it is authorized and managed."},{"@type":"Syllabus","name":"Conduct system configuration reviews","timeRequired":"PT2M51S","description":"Learn how to conduct system configuration reviews effectively. Gain insights into how these reviews help identify incorrect or missing system settings that could lead to security vulnerabilities. Learn how to assess system configurations against established security standards and best practices to ensure a robust security posture."},{"@type":"Syllabus","name":"Conduct network sniffing","timeRequired":"PT1M19S","description":"Learn about conducting network sniffing, including using Wireshark, a network sniffing tool, to capture and analyze network traffic. Gain practical skills in applying various techniques and tools for network sniffing, helping you uncover potential security issues and monitor network performance."},{"@type":"Syllabus","name":"Network sniffing tool demo: Wireshark","timeRequired":"PT2M16S","description":"Learn how to utilize Wireshark, a network sniffing tool installed on Kali Linux, to capture and analyze network traffic. See how to start Wireshark capture on the source system, stop the capture, and analyze the captured data. Learn how to focus on relevant packets by applying filters, such as HTTP filtering. Understand the significance of unencrypted credentials in network traffic and the potential security implications."},{"@type":"Syllabus","name":"Conduct file integrity checking","timeRequired":"PT2M39S","description":"Learn how to conduct file integrity checking effectively. Discover how techniques like hashing can confirm a file's integrity and ensure its authenticity. Learn how to use hash tools and scripts to check the integrity of files systematically."},{"@type":"Syllabus","name":"File integrity checking tool demo","timeRequired":"PT1M21S","description":"Learn how to use the Hash Tool, a free file hashing utility, to generate and validate file hashes for integrity checking. Understand the concept of file integrity checking by selecting a file and observing its generated hash, making small changes to the file, and rehashing it. This demonstration provides insight into the importance of maintaining file integrity and the role of hash tools in ensuring data security."},{"@type":"Syllabus","name":"Challenge: Pick the right reviews","timeRequired":"PT1M6S","description":"Marc Menninger challenges you to apply what you've learned in this chapter to see if you can pick the right reviews to conduct during the technical security assessment for a given scenario. Learn how different types of reviews can be used in different scenarios."},{"@type":"Syllabus","name":"Solution: Pick the right reviews","timeRequired":"PT2M37S","description":"Marc Menninger shares his solution for the reviews he would conduct during the technical security assessment for a given scenario. Use this information to help you select the correct reviews in your next technical security assessment."},{"@type":"Syllabus","name":"Baseline skill sets target identification and analysis","timeRequired":"PT2M22S","description":"Learn about the four key techniques crucial for identifying and analyzing testing targets. Understand the essential baseline skill sets required for each of these techniques, which include network discovery, network port and service identification, vulnerability scanning, and wireless scanning."},{"@type":"Syllabus","name":"Conduct network discovery","timeRequired":"PT2M25S","description":"Learn about conducting network discovery to identify testing targets effectively. Discover the key differences between passive and active network discovery methods and gain practical insights through demonstrations of various tools used for these forms of discovery."},{"@type":"Syllabus","name":"Network discovery tool demo","timeRequired":"PT2M43S","description":"Learn about passive and active network discovery techniques using NetworkMiner and Legion. By demonstrating how to passively detect devices on a network using NetworkMiner and actively scan for devices using Legion's Nmap host discovery, you can understand the differences between these approaches. Gain insight into the advantages and trade-offs of passive and active network discovery methods in a security assessment context."},{"@type":"Syllabus","name":"Challenge: Install and run Nmap","timeRequired":"PT52S","description":"Marc Menninger challenges you to install and run Nmap. Learn how to run an Nmap scan against your host computer and observe how Nmap detects which ports are open and attempts to identify the operating system of your computer."},{"@type":"Syllabus","name":"Solution: Install and run Nmap","timeRequired":"PT2M25S","description":"Marc Menninger shares how to install and run Nmap. He shows you how to run an Nmap scan against your host computer and explains how Nmap detects which ports are open and attempts to identify the operating system of your computer."},{"@type":"Syllabus","name":"Identify network ports and services","timeRequired":"PT1M49S","description":"Learn how to effectively identify network ports and services. Understand the role of OS fingerprinting in determining the operating systems of network devices and gain practical experience with tools like Sparta and Nmap for scanning ports and services."},{"@type":"Syllabus","name":"Network ports and services discovery tool demo","timeRequired":"PT3M13S","description":"Learn how to conduct an Nmap scan to identify ports and services on network devices. Gain insight into the progressive scanning approach employed by Legion by exploring the configuration file and understanding the stages of the scan. Discover how Legion automatically checks for running services associated with open ports and accurately identifies operating systems on scanned devices."},{"@type":"Syllabus","name":"Scan for vulnerabilities","timeRequired":"PT3M40S","description":"Learn about scanning devices for vulnerabilities. Gain insights into the operation of network vulnerability scanners and their significance. Understand why reports generated from vulnerability scanning are useful for effective penetration testing."},{"@type":"Syllabus","name":"Vulnerability scanning tool demo","timeRequired":"PT3M17S","description":"Learn how to use OpenVAS for vulnerability scanning as part of a technical security assessment. Understand how to define target address ranges, configure scan tasks, and interpret scan results. Discover how to access and utilize mitigation solutions provided by OpenVAS for identified vulnerabilities, and export scan results into various report formats for further analysis and inclusion in the final assessment report."},{"@type":"Syllabus","name":"Scan wireless networks","timeRequired":"PT4M5S","description":"Learn about scanning wireless networks. Understand various wireless technologies, explore different tools for wireless network scanning, and familiarize yourself with NIST guidelines for securing wireless networks."},{"@type":"Syllabus","name":"Baseline skill sets for target vulnerability validation","timeRequired":"PT49S","description":"Learn about various techniques for validating target vulnerabilities. Understand the specific skill sets needed to effectively execute these techniques and accurately detect vulnerabilities in your security assessments."},{"@type":"Syllabus","name":"Crack passwords","timeRequired":"PT1M53S","description":"Learn the fundamentals of password cracking. Understand the primary objective of password cracking, which is to identify weak passwords that violate security policies. Discover different password cracking techniques such as dictionary, hybrid, and brute force attacks."},{"@type":"Syllabus","name":"Password cracking tool demo","timeRequired":"PT3M23S","description":"Learn how to use John the Ripper to crack passwords. Understand the process of accessing and analyzing password hashes in the shadow file, running John the Ripper with various options to crack passwords, and interpreting the results. Grasp the vulnerability of weak passwords and the importance of strong password policies in ensuring system security."},{"@type":"Syllabus","name":"Challenge: Install and run a password cracker","timeRequired":"PT1M3S","description":"Marc Menninger challenges you to install and run Hash Suite, a password cracker. Attempt to crack passwords from a sample file of password hashes. Learn how password crackers work which can be helpful on future technical security assessments."},{"@type":"Syllabus","name":"Solution: Install and run a password cracker","timeRequired":"PT2M27S","description":"Marc Menninger shares how to install and run Hash Suite, a password cracker. He shows you how to crack passwords from a sample file of password hashes. Discover how password crackers work which can be a valuable skill when conducting technical security assessments."},{"@type":"Syllabus","name":"Conduct penetration tests","timeRequired":"PT3M3S","description":"Learn how to conduct penetration testing. Gain insight into the four-stage methodology and the four key objectives of penetration testing, and explore various guides and software tools essential for successful penetration testing execution."},{"@type":"Syllabus","name":"Penetration testing tool demo","timeRequired":"PT2M46S","description":"Learn how to perform penetration testing. Explore the process of conducting port and service discovery on target systems, identifying potential vulnerabilities, and exploiting them to gain unauthorized access. Discover how to navigate databases, extract sensitive information, and interpret findings for inclusion in a penetration testing report."},{"@type":"Syllabus","name":"Conduct social engineering","timeRequired":"PT1M15S","description":"Learn how to conduct social engineering. Understand why social engineering is an important component of technical security assessments and explore various methods of conducting social engineering effectively."},{"@type":"Syllabus","name":"Develop a security assessment policy","timeRequired":"PT1M10S","description":"Learn how to develop a security assessment policy. Understand how this policy provides essential guidance for conducting assessments and grasp the potential consequences of operating without a formal, written security assessment policy."},{"@type":"Syllabus","name":"Prioritize and schedule the assessments","timeRequired":"PT2M7S","description":"Learn how to prioritize and schedule technical security assessments. Understand how to rank systems for assessment based on various factors, and discover the significant role that effective planning plays in ensuring the success of a security assessment."},{"@type":"Syllabus","name":"Select and customize techniques","timeRequired":"PT2M38S","description":"Learn how to select and customize techniques while planning technical security assessments. Understand how to determine the most appropriate techniques for different testing scenarios, and gain insights into tailoring these techniques to meet specific assessment objectives and requirements."},{"@type":"Syllabus","name":"Select the assessors","timeRequired":"PT1M36S","description":"Learn how to select the right people to conduct technical security assessments. Understand the various technical skill sets an assessor must possess. Discover why selecting the right assessors with these skill sets is crucial for increasing the chances of a successful technical security assessment."},{"@type":"Syllabus","name":"Select the location","timeRequired":"PT1M42S","description":"Learn about the significance of selecting the right location for conducting technical security assessments. Discover how different testing techniques influence the choice of assessment locations, and understand why the testing location is a crucial factor to consider during the planning of a security test for optimal results."},{"@type":"Syllabus","name":"Select tools and resources","timeRequired":"PT1M33S","description":"Learn about the selection of tools and resources essential for planning a technical security assessment. Discover a variety of tools and resources that are appropriate for different testing techniques used in assessments, and understand how the right choice can significantly enhance the effectiveness and accuracy of your security evaluation."},{"@type":"Syllabus","name":"Develop the assessment plan","timeRequired":"PT1M27S","description":"Learn how to develop the technical security assessment plan, including the key elements such as scope, coordination, and data handling procedures, ensuring a comprehensive and effective security testing process."},{"@type":"Syllabus","name":"Challenge: Write a security assessment methodology","timeRequired":"PT1M29S","description":"Marc Menninger challenges you to write a methodology for a technical security assessment. Learn about what information is usually included in a methodology and get practice writing one before your next technical security assessment."},{"@type":"Syllabus","name":"Solution: Write a security assessment methodology","timeRequired":"PT58S","description":"Marc Menninger shares how he would write a methodology for a technical security assessment and shows you what information is usually included in a methodology. Learn how they can be written in the security assessment planning document."},{"@type":"Syllabus","name":"Legal considerations","timeRequired":"PT1M6S","description":"Learn about the legal considerations to factor into security assessment planning, including the essential components of a legal agreement and the importance of such agreements, especially when working with third-party assessors."},{"@type":"Syllabus","name":"Coordinate the assessment","timeRequired":"PT1M31S","description":"Learn the importance of effective coordination in achieving technical security assessment objectives. Discover strategies for ensuring smooth communication and collaboration throughout the assessment process."},{"@type":"Syllabus","name":"Conduct the assessment","timeRequired":"PT1M19S","description":"Learn how to conduct a security assessment effectively, understanding potential threats and roadblocks that might affect its success. Discover strategies for navigating challenges such as organizational resistance, severe security findings, and significant operational impacts."},{"@type":"Syllabus","name":"Conduct the analysis","timeRequired":"PT2M17S","description":"Learn how to analyze the security vulnerabilities found while conducting the assessment, including methods to validate the vulnerabilities and differentiate between false positives and actual threats. Discover the significance of root cause analysis in identifying underlying security weaknesses."},{"@type":"Syllabus","name":"Challenge: Categorize assessment findings","timeRequired":"PT1M42S","description":"Marc Menninger challenges you to categorize assessment findings using control families defined in NIST SP 800-53. Learn how categorizing assessment findings can give some organization to the vulnerabilities found which helps during the remediation process."},{"@type":"Syllabus","name":"Solution: Categorize assessment findings","timeRequired":"PT2M23S","description":"Marc Menninger shows you how to categorize assessment findings using control families defined in NIST SP 800-53. Discover that categorizing assessment findings can give some organization to the vulnerabilities found which helps during the remediation process."},{"@type":"Syllabus","name":"Data handling considerations","timeRequired":"PT1M17S","description":"Learn the key data handling processes necessary for conducting technical security assessments. Gain insights into the data lifecycle and understand how to appropriately manage and secure data during each phase of this lifecycle."},{"@type":"Syllabus","name":"Recommend mitigation actions","timeRequired":"PT1M15S","description":"Learn how to effectively recommend mitigation actions for each finding after completing testing and analysis. Discover the importance of addressing the root causes of vulnerabilities in these recommendations."},{"@type":"Syllabus","name":"Challenge: Recommend mitigation actions","timeRequired":"PT1M5S","description":"Marc Menninger challenges you to recommend mitigation actions for a set of critical findings from an example technical security assessment. Learn how to make mitigation recommendations based on your personal experience or research."},{"@type":"Syllabus","name":"Solution: Recommend mitigation actions","timeRequired":"PT1M59S","description":"Marc Menninger shows you how he would recommend mitigation actions for a set of critical findings from an example technical security assessment. He shows you how to make mitigation recommendations based on your personal experience or research."},{"@type":"Syllabus","name":"Report the results","timeRequired":"PT1M24S","description":"Learn how to effectively report the results after conducting a technical security assessment. Understand why the final report is the key deliverable from the assessment, and how it plays an important role in communicating findings, implications, and recommendations to stakeholders."},{"@type":"Syllabus","name":"Implement remediation and mitigation","timeRequired":"PT1M51S","description":"Learn the process of implementing remediation and mitigation following the delivery of a security assessment report. Discover the four critical steps of the remediation process and how to create an effective remediation report."},{"@type":"Syllabus","name":"Begin your testing journey","timeRequired":"PT45S","description":"Review how this course equipped you with the knowledge to conduct a technical security assessment. Understand that practical experience is critical to mastering testing skills and learn some ways to gain that experience."}],"aggregateRating":{"@type":"AggregateRating","ratingCount":91,"ratingValue":4.8,"bestRating":5,"worstRating":1},"review":[{"@type":"Review","author":{"@type":"Person","name":"Michael Georg Speller","jobTitle":"Freelance Interim: 3rd Party Risks & IT Compliance | AuditDefense | Digital/Operational Resilience |...","url":"https://ch.linkedin.com/in/michaelgeorgspeller"},"reviewRating":{"@type":"Rating","ratingValue":5},"reviewBody":"Recommended to all those in the EU who will have to orchestrate Digital Operational Resilience Testing according to #DORA for the first time. 👍","datePublished":"2024-08-25T10:27:29.946Z","publisher":{"@type":"Organization","name":"LinkedIn"},"bestRating":5,"worstRating":1},{"@type":"Review","author":{"@type":"Person","name":"Thorsten Bertram","jobTitle":"Verbindungen und gute Gespräche entstehen durch Austausch, lass uns ins Gespräch kommen.","url":"https://de.linkedin.com/in/tbertram-b3rw1n"},"reviewRating":{"@type":"Rating","ratingValue":5},"reviewBody":"I highly recommend this course as an outstanding introduction to technical security auditing! The content is well-structured, offering a clear and concise overview that’s perfect for anyone new to this area or looking to solidify foundational knowledge. It covers the key principles and essential practices. Engaging and practical – definitely worth the time!","datePublished":"2024-10-30T09:28:13.048Z","publisher":{"@type":"Organization","name":"LinkedIn"},"bestRating":5,"worstRating":1},{"@type":"Review","author":{"@type":"Person","name":"Unganase Prosper","jobTitle":"Senior Core T24 System Administrator","url":"https://rw.linkedin.com/in/unganase-prosper-665911109"},"reviewRating":{"@type":"Rating","ratingValue":5},"reviewBody":"i can recommend","datePublished":"2024-07-03T20:36:00.062Z","publisher":{"@type":"Organization","name":"LinkedIn"},"bestRating":5,"worstRating":1}],"video":{"@type":"VideoObject","name":"Understanding technical security audits and assessments - Performing a Technical Security Audit and Assessment","author":{"@type":"Person","name":"Marc Menninger","description":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","jobTitle":"Information Security Officer | Transformational Security Leader \"I Build Security Programs\" | Cybersecurity LinkedIn Learning Course Instructor","url":"https://www.linkedin.com/in/marcmenninger"},"thumbnailUrl":"https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&v=beta&t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q","description":"Discover a proven method for conducting thorough and effective technical information audits. Learn how to develop the testing methodology essential for technical security reviews.","duration":"PT44S","datePublished":"2024-05-20","uploadDate":"2024-05-20","requiresSubscription":false,"isAccessibleForFree":true,"contentUrl":"https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/understanding-technical-security-audits-and-assessments"},"educationalLevel":"Intermediate","educationalCredentialAwarded":[{"@type":"EducationalOccupationalCredential","name":"LinkedIn Learning Certificate of Completion","url":"https://www.linkedin.com/help/learning/answer/a598944/learning-certificates-of-completion-faqs","credentialCategory":"Certificate","offers":[{"@type":"Offer","category":"Subscription"}]}]} </script> <!----> </head> <body dir="ltr"> <!----><!----><!----> <!----> <a href="#main-content" class="skip-link btn-md btn-primary absolute z-11 -top-[100vh] focus:top-0"> Skip to main content </a> <header class="header base-detail-page__header px-mobile-container-padding bg-color-background-container global-alert-offset sticky-header"> <nav class="nav pt-1.5 pb-2 flex items-center justify-between relative flex-nowrap babymamabear:py-1.5 nav--minified-mobile " aria-label="Primary"> <a href="https://www.linkedin.com/learning/?trk=learning-course_nav-header-logo" class="nav__logo-link link-no-visited-state z-1 mr-auto min-h-[52px] flex items-center babybear:z-0 hover:no-underline focus:no-underline active:no-underline babymamabear:mr-3" data-tracking-control-name="learning-course_nav-header-logo" data-tracking-will-navigate> <div class="learning-logo"> <icon class="learning-logo__inbug onload" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/4zqr0f9jf98vi2nkijyc3bex2"></icon> <span class="learning-logo__text" aria-hidden="true">Learning</span> <span class="sr-only">LinkedIn Learning</span> </div> </a> <section class="search-bar relative flex flex-grow h-[40px] bg-cool-gray-20 min-w-0 max-w-full mx-4 rounded-sm babymamabear:mx-0 babymamabear:mb-1.5 babymamabear:bg-color-transparent babymamabear:w-full babymamabear:flex babymamabear:flex-wrap search-bar--minified-mobile" data-current-search-type="LEARNING"> <button class="search-bar__placeholder papabear:hidden text-input w-full mt-1.5 !pl-[14px] border-1 border-solid border-color-border-faint rounded-[2px] h-[40px] max-h-[40px] flex items-center overflow-hidden cursor-text" data-tracking-control-name="learning-course_search-switcher-opener"> <icon class="text-color-icon w-3 h-3 mr-1" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/397vrsk6op88l4981ji1xe1qt"></icon> <div class="search-bar__full-placeholder font-sans text-md text-color-text max-w-[calc(100%-40px)] text-left whitespace-nowrap overflow-hidden text-ellipsis"> <!----><!----> Search skills, subjects, or software <!----> </div> <span class="sr-only">Expand search</span> </button> <div class="switcher-tabs__trigger-and-tabs babymamabear:flex"> <button aria-expanded="false" class="switcher-tabs__placeholder flex !h-full !py-0 !pl-2 !pr-1.5 border-r-1 border-solid border-r-color-border-faint babymamabear:hidden tab-md papabear:tab-vertical papabear:justify-start cursor-pointer" data-tracking-control-name="learning-course_switcher-tabs-placeholder" aria-describedby="switcher-description"> <span class="switcher-tabs__placeholder-text m-auto"></span> <icon class="switcher-tabs__caret-down-filled onload pointer-events-none block my-auto min-h-[24px] min-w-[24px] h-[24px] babymamabear:hidden" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/7asbl4deqijhoy3z2ivveispv"></icon> </button> <div id="switcher-description" class="hidden">This button displays the currently selected search type. When expanded it provides a list of search options that will switch the search inputs to match the current selection. </div> <!----> <div class="switcher-tabs hidden z-[1] w-auto min-w-[160px] mb-1.5 py-1 absolute top-[48px] left-0 border-solid border-1 border-color-border-faint papabear:container-raised babymamabear:static babymamabear:w-[100vw] babymamabear:h-[48px] babymamabear:p-0 overflow-y-hidden overflow-x-auto md:overflow-x-hidden"> <ul class="switcher-tabs__list flex flex-1 items-stretch papabear:flex-col" role="tablist"> <li class="switcher-tabs__tab h-[44px] babymamabear:basis-1/2" role="presentation"> <button aria-controls="jobs-search-panel" aria-selected="false" class="switcher-tabs__button w-full h-full tab-md papabear:tab-vertical papabear:justify-start cursor-pointer " data-switcher-type="JOBS" data-tracking-control-name="learning-course_switcher-tabs-jobs-search-switcher" id="job-switcher-tab" role="tab"> Jobs </button> </li> <li class="switcher-tabs__tab h-[44px] babymamabear:basis-1/2" role="presentation"> <button aria-controls="people-search-panel" aria-selected="false" class="switcher-tabs__button w-full h-full tab-md papabear:tab-vertical papabear:justify-start cursor-pointer " data-switcher-type="PEOPLE" data-tracking-control-name="learning-course_switcher-tabs-people-search-switcher" id="people-switcher-tab" role="tab"> People </button> </li> <li class="switcher-tabs__tab h-[44px] babymamabear:basis-1/2" role="presentation"> <button aria-controls="learning-search-panel" aria-selected="true" class="switcher-tabs__button w-full h-full tab-md papabear:tab-vertical papabear:justify-start cursor-pointer tab-selected" data-switcher-type="LEARNING" data-tracking-control-name="learning-course_switcher-tabs-learning-search-switcher" id="learning-switcher-tab" role="tab"> Learning </button> </li> </ul> <button aria-label="Close" class="switcher-tabs__cancel-btn papabear:hidden block w-6 h-6 m-auto text-color-text-low-emphasis" data-tracking-control-name="learning-course_switcher-tabs-cancel-search-switcher" type="button"> <icon class="switcher-tabs__cancel-icon block w-3 h-3 m-auto onload" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cs55jggk4p3uqh9ozxdmpvjg7"></icon> </button> </div> </div> <section class="base-search-bar w-full h-full" data-searchbar-type="PEOPLE" aria-labelledby="people-switcher-tab" id="people-search-panel" role="tabpanel"> <form class="base-search-bar__form w-full flex babymamabear:mx-mobile-container-padding babymamabear:flex-col" role="search" action="/pub/dir" data-tracking-control-name="learning-course_people-search-bar_base-search-bar-form"> <section class="dismissable-input text-input !pr-3 bg-color-transparent flex items-center h-[40px] min-w-0 relative babybear:w-full babybear:mb-1 search-input"> <input aria-label="First Name" autocomplete="on" class="dismissable-input__input font-sans text-md text-color-text bg-color-transparent flex items-center flex-1 focus:outline-none placeholder:text-color-text-secondary" data-tracking-control-name="learning-course_people-search-bar_first-name_dismissable-input" maxlength="500" name="firstName" placeholder="First Name" type="search"> <button class="dismissable-input__button text-color-text h-[40px] min-w-[24px] w-[24px] -mr-2 opacity-0 transition-opacity duration-[0.1s] disabled:invisible focus:opacity-100" data-tracking-control-name="learning-course_people-search-bar_first-name_dismissable-input-clear" type="button"> <label class="sr-only">Clear text</label> <icon class="dismissable-input__button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cs55jggk4p3uqh9ozxdmpvjg7"></icon> </button> </section> <section class="dismissable-input text-input !pr-3 bg-color-transparent flex items-center h-[40px] min-w-0 relative babybear:w-full babybear:mb-1 search-input"> <input aria-label="Last Name" autocomplete="on" class="dismissable-input__input font-sans text-md text-color-text bg-color-transparent flex items-center flex-1 focus:outline-none placeholder:text-color-text-secondary" data-tracking-control-name="learning-course_people-search-bar_last-name_dismissable-input" maxlength="500" name="lastName" placeholder="Last Name" type="search"> <button class="dismissable-input__button text-color-text h-[40px] min-w-[24px] w-[24px] -mr-2 opacity-0 transition-opacity duration-[0.1s] disabled:invisible focus:opacity-100" data-tracking-control-name="learning-course_people-search-bar_last-name_dismissable-input-clear" type="button"> <label class="sr-only">Clear text</label> <icon class="dismissable-input__button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cs55jggk4p3uqh9ozxdmpvjg7"></icon> </button> </section> <input name="trk" value="learning-course_people-search-bar_search-submit" type="hidden"> <button class="base-search-bar__submit-btn block basis-[40px] flex-shrink-0 cursor-pointer babymamabear:invisible babymamabear:ml-[-9999px] babymamabear:w-[1px] babymamabear:h-[1px]" aria-label="Search" data-tracking-control-name="learning-course_people-search-bar_base-search-bar-search-submit" type="submit"> <icon class="base-search-bar__search-icon onload mx-auto" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cb5bsr4tsn2r4sjg9e3ls4tjl"></icon> </button> </form> </section> <section class="base-search-bar w-full h-full" data-searchbar-type="JOBS" aria-labelledby="job-switcher-tab" id="jobs-search-panel" role="tabpanel"> <form class="base-search-bar__form w-full flex babymamabear:mx-mobile-container-padding babymamabear:flex-col" role="search" action="/jobs/search" data-tracking-control-name="learning-course_jobs-search-bar_base-search-bar-form"> <code id="i18n_aria_live_text_no-suggestions" style="display: none"><!--"No suggestions found"--></code> <code id="i18n_aria_live_text_one-suggestion" style="display: none"><!--"One Suggestion. Use up and down keys to navigate"--></code> <code id="i18n_aria_live_text_multiple-suggestions" style="display: none"><!--"Multiple Suggestions. Use up and down keys to navigate"--></code> <section class="dismissable-input text-input !pr-3 bg-color-transparent flex items-center h-[40px] min-w-0 relative babybear:w-full babybear:mb-1 typeahead-input keywords-typeahead-input text-input"> <input aria-autocomplete="list" aria-controls="job-search-bar-keywords-typeahead-list" aria-haspopup="listbox" aria-label="Search job titles or companies" autocomplete="off" class="dismissable-input__input font-sans text-md text-color-text bg-color-transparent flex items-center flex-1 focus:outline-none placeholder:text-color-text-secondary" data-tracking-control-name="learning-course_dismissable-input" id="job-search-bar-keywords" maxlength="500" name="keywords" placeholder="Search job titles or companies" role="combobox" type="search"> <!----> <div class="typeahead-input__dropdown container-lined absolute top-[calc(100%+3px)] left-0 w-full rounded-b-md rounded-t-none z-[10] overflow-hidden max-w-none babybear:min-w-full babybear:bottom-0 babybear:overflow-y-auto"> <template class="typeahead-item-template"> <li class="typeahead-input__dropdown-item py-1.5 px-2 hover:cursor-pointer hover:bg-color-surface-new-hover hover:border-y-2 hover:border-solid hover:border-color-container-primary" role="option"> <span class="typeahead-input__dropdown-text font-sans text-sm font-bold text-color-text"></span> </li> </template> <ul class="typeahead-input__dropdown-list w-full" id="job-search-bar-keywords-typeahead-list" role="listbox"></ul> </div> <!----> <button class="dismissable-input__button text-color-text h-[40px] min-w-[24px] w-[24px] -mr-2 opacity-0 transition-opacity duration-[0.1s] disabled:invisible focus:opacity-100" data-tracking-control-name="learning-course_dismissable-input-clear" type="button"> <label class="sr-only">Clear text</label> <icon class="dismissable-input__button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cs55jggk4p3uqh9ozxdmpvjg7"></icon> </button> </section> <!----> <code id="i18n_aria_live_text_no-suggestions" style="display: none"><!--"No suggestions found"--></code> <code id="i18n_aria_live_text_one-suggestion" style="display: none"><!--"One Suggestion. Use up and down keys to navigate"--></code> <code id="i18n_aria_live_text_multiple-suggestions" style="display: none"><!--"Multiple Suggestions. Use up and down keys to navigate"--></code> <section class="dismissable-input text-input !pr-3 bg-color-transparent flex items-center h-[40px] min-w-0 relative babybear:w-full babybear:mb-1 typeahead-input location-typeahead-input"> <input aria-autocomplete="list" aria-controls="job-search-bar-location-typeahead-list" aria-haspopup="listbox" aria-label="Location" autocomplete="off" class="dismissable-input__input font-sans text-md text-color-text bg-color-transparent flex items-center flex-1 focus:outline-none placeholder:text-color-text-secondary" data-tracking-control-name="learning-course_dismissable-input" id="job-search-bar-location" maxlength="500" name="location" placeholder="Location" role="combobox" value="Singapore" type="search"> <!----> <div class="typeahead-input__dropdown container-lined absolute top-[calc(100%+3px)] left-0 w-full rounded-b-md rounded-t-none z-[10] overflow-hidden max-w-none babybear:min-w-full babybear:bottom-0 babybear:overflow-y-auto"> <template class="typeahead-item-template"> <li class="typeahead-input__dropdown-item py-1.5 px-2 hover:cursor-pointer hover:bg-color-surface-new-hover hover:border-y-2 hover:border-solid hover:border-color-container-primary" role="option"> <span class="typeahead-input__dropdown-text font-sans text-sm font-bold text-color-text"></span> </li> </template> <ul class="typeahead-input__dropdown-list w-full" id="job-search-bar-location-typeahead-list" role="listbox"></ul> </div> <!----> <button class="dismissable-input__button text-color-text h-[40px] min-w-[24px] w-[24px] -mr-2 opacity-0 transition-opacity duration-[0.1s] disabled:invisible focus:opacity-100" data-tracking-control-name="learning-course_dismissable-input-clear" type="button"> <label class="sr-only">Clear text</label> <icon class="dismissable-input__button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cs55jggk4p3uqh9ozxdmpvjg7"></icon> </button> </section> <input name="geoId" value="111422291" type="hidden"> <input name="trk" value="learning-course_jobs-search-bar_search-submit" type="hidden"> <button class="base-search-bar__submit-btn block basis-[40px] flex-shrink-0 cursor-pointer babymamabear:invisible babymamabear:ml-[-9999px] babymamabear:w-[1px] babymamabear:h-[1px]" aria-label="Search" data-tracking-control-name="learning-course_jobs-search-bar_base-search-bar-search-submit" type="submit"> <icon class="base-search-bar__search-icon onload mx-auto" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cb5bsr4tsn2r4sjg9e3ls4tjl"></icon> </button> </form> </section> <section class="base-search-bar w-full h-full" data-searchbar-type="LEARNING" aria-labelledby="learning-switcher-tab" id="learning-search-panel" role="tabpanel"> <form class="base-search-bar__form w-full flex babymamabear:mx-mobile-container-padding babymamabear:flex-col" role="search" action="/learning/search" data-tracking-control-name="learning-course_learning-search-bar_base-search-bar-form"> <section class="dismissable-input text-input !pr-3 bg-color-transparent flex items-center h-[40px] min-w-0 relative babybear:w-full babybear:mb-1 search-input"> <input aria-label="Search skills, subjects, or software" autocomplete="on" class="dismissable-input__input font-sans text-md text-color-text bg-color-transparent flex items-center flex-1 focus:outline-none placeholder:text-color-text-secondary" data-tracking-control-name="learning-course_learning-search-bar_keywords_dismissable-input" maxlength="500" name="keywords" placeholder="Search skills, subjects, or software" type="search"> <button class="dismissable-input__button text-color-text h-[40px] min-w-[24px] w-[24px] -mr-2 opacity-0 transition-opacity duration-[0.1s] disabled:invisible focus:opacity-100" data-tracking-control-name="learning-course_learning-search-bar_keywords_dismissable-input-clear" type="button"> <label class="sr-only">Clear text</label> <icon class="dismissable-input__button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cs55jggk4p3uqh9ozxdmpvjg7"></icon> </button> </section> <input class="nav__search-uoo" name="upsellOrderOrigin" type="hidden"> <input name="trk" value="learning-course_learning-search-bar_search-submit" type="hidden"> <button class="base-search-bar__submit-btn block basis-[40px] flex-shrink-0 cursor-pointer babymamabear:invisible babymamabear:ml-[-9999px] babymamabear:w-[1px] babymamabear:h-[1px]" aria-label="Search" data-tracking-control-name="learning-course_learning-search-bar_base-search-bar-search-submit" type="submit"> <icon class="base-search-bar__search-icon onload mx-auto" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cb5bsr4tsn2r4sjg9e3ls4tjl"></icon> </button> </form> </section> <div aria-live="polite" class="search-bar__live-text sr-only" role="status"></div> </section> <!----> <div class="nav__cta-container order-3 flex gap-x-1 justify-end min-w-[100px] flex-nowrap flex-shrink-0 babybear:flex-wrap flex-2 babymamabear:min-w-[50px] "> <!----> <a class="nav__button-tertiary btn-md btn-tertiary" href="http://www.linkedin.com/learning/subscription/products?courseSlug=performing-a-technical-security-audit-and-assessment-21079807&amp;destRedirectURL=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Flearning%2Fperforming-a-technical-security-audit-and-assessment-21079807&amp;trk=learning-course_nav-header-join&amp;upsellTrk=lil_upsell_nav_subscription&amp;session_redirect=https%3A%2F%2Fwww.linkedin.com%2Flearning%2Fperforming-a-technical-security-audit-and-assessment-21079807%3Ftrk%3Dlearning-course_similar-courses" data-tracking-control-name="lil_upsell_nav_subscription" data-tracking-impression-name="lil_upsell_nav_subscription" data-test-live-nav-primary-cta data-tracking-will-navigate> Start free trial </a> <a class="nav__button-secondary btn-secondary-emphasis btn-md" href="https://www.linkedin.com/learning-login/?redirect=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Flearning%2Fperforming-a-technical-security-audit-and-assessment-21079807%3Ftrk%3Dlearning-course_similar-courses%26trk%3Dlearning-course_similar-courses&amp;fromSignIn=true&amp;session_redirect=https%3A%2F%2Fwww.linkedin.com%2Flearning%2Fperforming-a-technical-security-audit-and-assessment-21079807%3Ftrk%3Dlearning-course_similar-courses&amp;trk=learning-course_nav-header-signin" data-tracking-control-name="learning-course_nav-header-signin" data-tracking-will-navigate> Sign in </a> <a aria-label="Sign in" class="nav__link-person papabear:hidden mamabear:hidden" data-tracking-control-name="learning-course_nav-header-signin" data-tracking-will-navigate href="https://www.linkedin.com/learning-login/?redirect=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Flearning%2Fperforming-a-technical-security-audit-and-assessment-21079807%3Ftrk%3Dlearning-course_similar-courses%26trk%3Dlearning-course_similar-courses&amp;fromSignIn=true&amp;session_redirect=https%3A%2F%2Fwww.linkedin.com%2Flearning%2Fperforming-a-technical-security-audit-and-assessment-21079807%3Ftrk%3Dlearning-course_similar-courses&amp;trk=learning-course_nav-header-signin"> <img class="inline-block relative rounded-[50%] w-4 h-4 bg-color-entity-ghost-background" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/9c8pery4andzj6ohjkjp54ma2" data-ghost-classes="bg-color-entity-ghost-background" data-ghost-url="https://static.licdn.com/aero-v1/sc/h/9c8pery4andzj6ohjkjp54ma2" alt> </a> </div> <!----> <!----> </nav> </header> <!----> <div class="cta-banner "> <div class="enterprise-nav"> <div class="enterprise-nav__content-wrapper"> <p id="enterprise-nav-solutions" class="enterprise-nav__content" tabindex="-1"> Solutions for: </p> <a href="https://learning.linkedin.com/for-entire-companies?src=li-learning-nav&trk=learning-course_enterprise-nav" aria-labelledby="enterprise-nav-solutions business-nav-business" class="enterprise-nav__content" data-tracking-control-name="learning-course_enterprise-nav" data-tracking-will-navigate="true" id="business-nav-business">Business</a> <a href="https://learning.linkedin.com/for-higher-education?src=li-learning-nav&trk=learning-course_enterprise-nav" aria-labelledby="enterprise-nav-solutions business-nav-education" class="enterprise-nav__content" data-tracking-control-name="learning-course_enterprise-nav" data-tracking-will-navigate="true" id="business-nav-education">Higher Education</a> <a href="https://learning.linkedin.com/for-governments?src=li-learning-nav&trk=learning-course_enterprise-nav" aria-labelledby="enterprise-nav-solutions business-nav-government" class="enterprise-nav__content" data-tracking-control-name="learning-course_enterprise-nav" data-tracking-will-navigate="true" id="business-nav-government">Government</a> <a href="/learning/subscription/teams?veh=lil_upx&src=li-learning-nav&trk=learning-course_enterprise-nav" aria-labelledby="enterprise-nav-solutions business-nav-buy" class="enterprise-nav__content" data-test-live-enterprise-upsell="true" data-tracking-control-name="learning-course_enterprise-nav" data-tracking-will-navigate="true" data-tracking-impression-name="lil_upsell_learning-course_enterprise-nav_teambuy" id="business-nav-buy">Buy for my team</a> </div> </div> <!----> <!----> </div> <main class="main papabear:flex papabear:w-content-max-w papabear:mx-auto papabear:pt-desktop-content-top-margin mamabear:pt-desktop-content-top-margin " id="main-content" role="main"> <section class="core-rail mx-auto papabear:w-core-rail-width mamabear:max-w-[790px] babybear:max-w-[790px]"> <ol class="breadcrumb__list"> <li class="breadcrumb__item"> <a class="breadcrumb__link" href="https://www.linkedin.com/learning/browse?trk=learning-course_breadcrumb" data-tracking-control-name="learning-course_breadcrumb" data-tracking-will-navigate>All topics</a> </li> <li class="breadcrumb__item"> <a class="breadcrumb__link" href="https://www.linkedin.com/learning/topics/technology?trk=learning-course_breadcrumb" data-tracking-control-name="learning-course_breadcrumb" data-tracking-will-navigate>Technology</a> </li> <li class="breadcrumb__item"> <a class="breadcrumb__link" href="https://www.linkedin.com/learning/topics/security-3?trk=learning-course_breadcrumb" data-tracking-control-name="learning-course_breadcrumb" data-tracking-will-navigate>Cybersecurity</a> </li> <li class="breadcrumb__item"> <a class="breadcrumb__link" href="https://www.linkedin.com/learning/topics/governance-risk-and-compliance?trk=learning-course_breadcrumb" data-tracking-control-name="learning-course_breadcrumb" data-tracking-will-navigate>Governance, Risk, and Compliance</a> </li> </ol> <script type="application/ld+json"> {"@context":"http://schema.org/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"All topics","item":"https://www.linkedin.com/learning/browse"},{"@type":"ListItem","position":2,"name":"Technology","item":"https://www.linkedin.com/learning/topics/technology"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https://www.linkedin.com/learning/topics/security-3"},{"@type":"ListItem","position":4,"name":"Governance, Risk, and Compliance","item":"https://www.linkedin.com/learning/topics/governance-risk-and-compliance"}]} </script> <section class="top-card-layout container-lined overflow-hidden babybear:rounded-[0px]"> <section class="top-card__image-container"> <img class="top-card__image" alt="Performing a Technical Security Audit and Assessment" data-delayed-url="https://media.licdn.com/dms/image/v2/D4D0DAQFZwnmqcPofLw/learning-public-crop_675_1200/learning-public-crop_675_1200/0/1715279836320?e=2147483647&amp;v=beta&amp;t=N2Us3oS7a7ZJjJwv-AcssgPnzcTXKAKQzYMw3GQ7H9Q"> <a class="top-card__overlay-button" data-tracking-control-name="course_preview" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/understanding-technical-security-audits-and-assessments?autoplay=true&amp;trk=course_preview"> <span class="top-card__preview-cta "> <icon class="top-card__preview-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/5jwhkytplzxiejvhzfu0t7m8l"> </icon> <span class="top-card__preview-cta-text">Preview</span> </span> <!----> </a> </section> <div class="top-card-layout__card relative p-2 papabear:p-details-container-padding"> <div class="top-card-layout__entity-info-container flex flex-wrap papabear:flex-nowrap"> <div class="top-card-layout__entity-info flex-grow flex-shrink-0 basis-0 babybear:flex-none babybear:w-full babybear:flex-none babybear:w-full"> <h1 class="top-card-layout__title font-sans text-lg papabear:text-xl font-bold leading-open text-color-text mb-0"> Performing a Technical Security Audit and Assessment </h1> <h2 class="top-card-layout__headline break-words font-sans text-md leading-open text-color-text"> <div class="top-card__headline-row"> <span class="top-card__headline-row-item top-card__headline-row-item--large">With Marc Menninger</span> <span class="top-card__headline-row-item">Liked by 99 users</span> </div> <div class="top-card__headline-row"> <span class="top-card__headline-row-item">Duration: 1h 54m</span> <span class="top-card__headline-row-item">Skill level: Intermediate</span> <span class="top-card__headline-row-item">Released: 5/20/2024</span> </div> </h2> <!----> <!----> <div class="top-card-layout__cta-container flex flex-wrap mt-0.5 papabear:mt-0 ml-[-12px]"> <a href="http://www.linkedin.com/learning/subscription/products?courseSlug=performing-a-technical-security-audit-and-assessment-21079807&amp;destRedirectURL=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Flearning%2Fperforming-a-technical-security-audit-and-assessment-21079807&amp;trk=course_info&amp;upsellTrk=lil_upsell_course_info_subscription" data-tracking-control-name="lil_upsell_course_info_subscription" data-tracking-impression-name="lil_upsell_course_info_subscription" data-litms-tracking-control-name="lil_upsell_course_info_subscription" data-tracking-will-navigate class="top-card__upsell-link top-card-layout__cta mt-2 ml-1.5 h-auto babybear:flex-auto top-card-layout__cta--primary btn-md btn-primary" data-test-live-course-sub-upsell> Start my 1-month free trial </a> <a class="buy-for-your-team-cta__link top-card-layout__cta mt-2 ml-1.5 h-auto babybear:flex-auto top-card-layout__cta--secondary btn-md btn-secondary" href="/learning/subscription/teams?veh=lil_upx&amp;src=li-lil-upsell&amp;trk=learning-course_buy-for-your-team-cta" data-tracking-control-name="learning-course_buy-for-your-team-cta" data-tracking-impression-name="lil_upsell_learning-course_buy-for-your-team-cta_teambuy" data-test-live-buy-for-your-team-upsell data-tracking-will-navigate> Buy for my team </a> </div> </div> <!----> </div> <!----> <!----> </div> </section> <div class="details mx-details-container-padding"> <section class="core-section-container my-3 course-details"> <!----> <h2 class="core-section-container__title section-title"> Course details </h2> <!----> <div class="core-section-container__content break-words"> <section class="show-more-less-html course-details__description" data-max-lines="4"> <div class="show-more-less-html__markup show-more-less-html__markup--clamp-after-4 relative overflow-hidden"> This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze targets, use key technical testing tools, identify and mitigate findings, and more. Performing technical information security audits and assessments is essential to protecting information assets. By the end of this course, you'll know how to determine if your network is secure. </div> <button class="show-more-less-html__button show-more-less-button show-more-less-html__button--more ml-0.5" data-tracking-control-name="learning-course_show-more-html-btn" aria-label="i18n_show_more" aria-expanded="false"> <!----> Show more <icon class="show-more-less-html__button-icon show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cyolgscd0imw2ldqppkrb84vo"></icon> </button> <button class="show-more-less-html__button show-more-less-button show-more-less-html__button--less ml-0.5" data-tracking-control-name="learning-course_show-less-html-btn" aria-label="i18n_show_less" aria-expanded="true"> <!----> Show less <icon class="show-more-less-html__button-icon show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/4chtt12k98xwnba1nimld2oyg"></icon> </button> <!----> </section> </div> </section> <section class="core-section-container my-3 course-skills"> <!----> <h2 class="core-section-container__title section-title"> Skills you’ll gain </h2> <!----> <div class="core-section-container__content break-words"> <ul class="course-skills__skill-list"> <li class="course-skills__skill-list-item"> <a href="https://www.linkedin.com/learning/search?keywords=IT+Security+Assessments&amp;trk=learning-course_pill-list" data-tracking-control-name="learning-course_pill-list" data-tracking-will-navigate class="pill flex w-fit mr-[6px] mb-1 hover:no-underline skill-pill"> IT Security Assessments </a> </li> <li class="course-skills__skill-list-item"> <a href="https://www.linkedin.com/learning/search?keywords=Security+Audits&amp;trk=learning-course_pill-list" data-tracking-control-name="learning-course_pill-list" data-tracking-will-navigate class="pill flex w-fit mr-[6px] mb-1 hover:no-underline skill-pill"> Security Audits </a> </li> </ul> </div> </section> <section class="core-section-container my-3"> <!----> <h2 class="core-section-container__title section-title"> Earn a sharable certificate </h2> <!----> <div class="core-section-container__content break-words"> <p class="course-certificate__body-paragraph">Share what you’ve learned, and be a standout professional in your desired industry with a certificate showcasing your knowledge gained from the course.</p> <div class="course-certificate__image-container"> <img class="course-certificate__certificate-image" alt="Sample certificate" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/52nu8qc7cfcn7vrftr7ttceqt"> <div> <h3 class="course-certificate__detail-list-heading"> <div class="learning-logo"> <icon class="learning-logo__inbug onload" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/4zqr0f9jf98vi2nkijyc3bex2"></icon> <span class="learning-logo__text learning-logo__text--show-on-mobile" aria-hidden="true">Learning</span> <span class="sr-only">LinkedIn Learning</span> </div> <span>Certificate of Completion</span> </h3> <ul> <li class="course-certificate__detail-list-item"> <div class="course-certificate__detail-list-item-icon-wrapper"><icon data-delayed-url="https://static.licdn.com/aero-v1/sc/h/5lqa4dj5v9gp6yjh6s6iwtdbb"></icon></div> <p class="course-certificate__detail-list-item-text">Showcase on your LinkedIn profile under “Licenses and Certificate” section</p> </li> <li class="course-certificate__detail-list-item"> <div class="course-certificate__detail-list-item-icon-wrapper"><icon data-delayed-url="https://static.licdn.com/aero-v1/sc/h/5lqa4dj5v9gp6yjh6s6iwtdbb"></icon></div> <p class="course-certificate__detail-list-item-text">Download or print out as PDF to share with others</p> </li> <li class="course-certificate__detail-list-item"> <div class="course-certificate__detail-list-item-icon-wrapper"><icon data-delayed-url="https://static.licdn.com/aero-v1/sc/h/5lqa4dj5v9gp6yjh6s6iwtdbb"></icon></div> <p class="course-certificate__detail-list-item-text">Share as image online to demonstrate your skill</p> </li> </ul> </div> </div> </div> </section> <section class="core-section-container my-3 course-instructors"> <!----> <h2 class="core-section-container__title section-title"> Meet the instructor </h2> <!----> <div class="core-section-container__content break-words"> <ul class="course-instructors__list"> <li class="course-instructors__list-item"> <a href="https://www.linkedin.com/in/marcmenninger?trk=learning-course_instructor" target="_self" data-tracking-control-name="learning-course_instructor" data-tracking-will-navigate class="base-card relative w-full hover:no-underline focus:no-underline base-card--link base-main-card flex flex-wrap py-2 pr-2 babybear:pr-0 base-main-card--link "> <!----> <img class="inline-block relative rounded-[50%] w-6 h-6 bg-color-entity-ghost-background" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/9c8pery4andzj6ohjkjp54ma2" data-ghost-classes="bg-color-entity-ghost-background" data-ghost-url="https://static.licdn.com/aero-v1/sc/h/9c8pery4andzj6ohjkjp54ma2" alt="Click here to view Marc Menninger’s instructor page"> <div class="base-main-card__info self-center ml-1 flex-1 relative break-words papabear:min-w-0 mamabear:min-w-0 babybear:w-full "> <!----> <h3 class="base-main-card__title font-sans text-[18px] font-bold text-color-text overflow-hidden "> Marc Menninger </h3> <h4 class="base-main-card__subtitle body-text text-color-text overflow-hidden "> Information Security Officer | Transformational Security Leader "I Build Security Programs" | Cybersecurity LinkedIn Learning Course Instructor </h4> <!----> <!----><!----> </div> <!----> </a> </li> </ul> </div> </section> <section class="core-section-container my-3 reviews-feed"> <!----> <h2 class="core-section-container__title section-title"> Learner reviews </h2> <!----> <div class="core-section-container__content break-words"> <div class="reviews-feed__ratings-summary"> <section class="ratings-summary"> <div class="ratings-summary__overall-rating"> <h3 class="ratings-summary__header"><span class="ratings-summary__rating-average">4.8</span> <span class="ratings-summary__rating-max">out of 5</span></h3> <figure class="ratings-summary__figure"> <span class="star-rating" role="img" aria-label="Rating: 4.8 out of 5 stars"> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> </span> <figcaption class="ratings-summary__ratings-total">91 ratings</figcaption> </figure> </div> <div class="ratings-summary__breakdown"> <div class="ratings-summary__disclaimer"> <div class="tooltip"> <button class="tooltip__trigger ratings-summary__disclaimer-trigger" data-tracking-control-name="toggle_disclaimer" type="button"> <icon class="ratings-summary__disclaimer-icon" data-svg-class-name="ratings-summary__disclaimer-icon-svg" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/g8uts9v3k83n9e3iyvcxit0k"> </icon> <span class="ratings-summary__disclaimer-text">How are ratings calculated?</span> </button> <span role="tooltip" class="tooltip__popup" aria-hidden="true"> The overall rating is calculated using the average of submitted ratings. Ratings and reviews can only be submitted when non-anonymous learners complete at least 40% of the course. This helps us avoid fake reviews and spam. </span> </div> </div> <ul> <li> <figure class="ratings-summary__rating-count"> <figcaption class="ratings-summary__rating-count-label"> 5 star </figcaption> <progress class="ratings-summary__progress-bar" max="91" value="75" aria-valuemin="0" aria-valuenow="75" aria-valuemax="91"> Current value: 75 </progress> <span class="ratings-summary__rating-count-percent"> 82% </span> </figure> </li> <li> <figure class="ratings-summary__rating-count"> <figcaption class="ratings-summary__rating-count-label"> 4 star </figcaption> <progress class="ratings-summary__progress-bar" max="91" value="11" aria-valuemin="0" aria-valuenow="11" aria-valuemax="91"> Current value: 11 </progress> <span class="ratings-summary__rating-count-percent"> 12% </span> </figure> </li> <li> <figure class="ratings-summary__rating-count"> <figcaption class="ratings-summary__rating-count-label"> 3 star </figcaption> <progress class="ratings-summary__progress-bar" max="91" value="4" aria-valuemin="0" aria-valuenow="4" aria-valuemax="91"> Current value: 4 </progress> <span class="ratings-summary__rating-count-percent"> 4% </span> </figure> </li> <li> <figure class="ratings-summary__rating-count"> <figcaption class="ratings-summary__rating-count-label"> 2 star </figcaption> <progress class="ratings-summary__progress-bar" max="91" value="1" aria-valuemin="0" aria-valuenow="1" aria-valuemax="91"> Current value: 1 </progress> <span class="ratings-summary__rating-count-percent"> 1% </span> </figure> </li> <li> <figure class="ratings-summary__rating-count"> <figcaption class="ratings-summary__rating-count-label"> 1 star </figcaption> <progress class="ratings-summary__progress-bar" max="91" value="0" aria-valuemin="0" aria-valuenow="0" aria-valuemax="91"> Current value: 0 </progress> <span class="ratings-summary__rating-count-percent"> 0% </span> </figure> </li> </ul> </div> </section> </div> <ul class="reviews-feed__reviews-list"> <li class="reviews-feed__reviews-list-item"> <div class="review-card"> <div class="base-card relative w-full hover:no-underline focus:no-underline base-card--link base-main-card flex flex-wrap py-2 pr-2 babybear:pr-0 base-main-card--link review-card__entity"> <a class="base-card__full-link absolute top-0 right-0 bottom-0 left-0 p-0 z-[2]" href="https://ch.linkedin.com/in/michaelgeorgspeller" data-tracking-control-name="learning-course" data-tracking-will-navigate> <span class="sr-only"> Michael Georg Speller <!----> </span> </a> <img class="inline-block relative rounded-[50%] w-6 h-6 " data-delayed-url="https://media.licdn.com/dms/image/v2/D4E03AQGJ8eTDazAndg/profile-displayphoto-shrink_100_100/profile-displayphoto-shrink_100_100/0/1710722955370?e=2147483647&amp;v=beta&amp;t=Zc2aHI6fXSk0NWH0uAU04vXsIrBJWAboUlstv2xoE3c" data-ghost-classes="bg-color-entity-ghost-background" data-ghost-url="https://static.licdn.com/aero-v1/sc/h/9c8pery4andzj6ohjkjp54ma2" alt="Michael Georg Speller"> <div class="base-main-card__info self-center ml-1 flex-1 relative break-words papabear:min-w-0 mamabear:min-w-0 babybear:w-full "> <!----> <h3 class="base-main-card__title font-sans text-[18px] font-bold text-color-text overflow-hidden "> Michael Georg Speller <!----> </h3> <h4 class="base-main-card__subtitle body-text text-color-text overflow-hidden "> Freelance Interim: 3rd Party Risks &amp; IT Compliance | AuditDefense | Digital/Operational Resilience |... </h4> <!----> <div class="body-text text-color-text-low-emphasis base-main-card__metadata"> <div class="review-card__content"> <div class="review-card__centered-row"> <div class="review-card__star-container"> <span class="star-rating" role="img" aria-label="Rating: 5 out of 5 stars"> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> </span> </div> <span class="review-card__rating"> 5/5 </span> <span class="review-card__date"> August 25, 2024 </span> </div> <div class="review-card__text"> Recommended to all those in the EU who will have to orchestrate Digital Operational Resilience Testing according to #DORA for the first time. 👍 </div> <div class="review-card__centered-row review-card__actions"> <a class="review-card__centered-row review-card__action-button" aria-label="Michael Georg Speller’s comment is helpful" data-tracking-control-name="learning-course_review-card-helpful-button" data-tracking-will-navigate href="https://www.linkedin.com/learning-login/?redirect=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Flearning%2Fperforming-a-technical-security-audit-and-assessment-21079807%3Ftrk%3Dlearning-course_similar-courses%26trk%3Dlearning-course_similar-courses&amp;trk=learning-course_review-card-helpful-button" rel="nofollow"> <icon class="review-card__centered-row review-card__action-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/5ptx189gjbxrh9wf3ncsehms9" data-svg-class-name="review-card__like-icon"></icon> Helpful </a> <span class="review-card__dot-delimiter">·</span> <a class="review-card__centered-row review-card__action-button" aria-label="Report Michael Georg Speller’s comment" data-tracking-control-name="learning-course_review-card-report-button" data-tracking-will-navigate href="https://www.linkedin.com/learning-login/?redirect=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Flearning%2Fperforming-a-technical-security-audit-and-assessment-21079807%3Ftrk%3Dlearning-course_similar-courses%26trk%3Dlearning-course_similar-courses&amp;trk=learning-course_review-card-report-button" rel="nofollow"> <icon class="review-card__centered-row review-card__action-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/d04ze1wt0ev8ck8e4ovqk762o" data-svg-class-name="review-card__flag-icon"></icon> Report </a> </div> </div> </div> <!----> </div> <!----> </div> </div> </li> <li class="reviews-feed__reviews-list-item"> <div class="review-card"> <div class="base-card relative w-full hover:no-underline focus:no-underline base-card--link base-main-card flex flex-wrap py-2 pr-2 babybear:pr-0 base-main-card--link review-card__entity"> <a class="base-card__full-link absolute top-0 right-0 bottom-0 left-0 p-0 z-[2]" href="https://de.linkedin.com/in/tbertram-b3rw1n" data-tracking-control-name="learning-course" data-tracking-will-navigate> <span class="sr-only"> Thorsten Bertram <!----> </span> </a> <img class="inline-block relative rounded-[50%] w-6 h-6 " data-delayed-url="https://media.licdn.com/dms/image/v2/D4E03AQEZCfiVQtVTqg/profile-displayphoto-shrink_100_100/profile-displayphoto-shrink_100_100/0/1712487087938?e=2147483647&amp;v=beta&amp;t=AAsm6U_xjECREwSp0EeHdI8-WJhYP7lA8FSGR2yGI1c" data-ghost-classes="bg-color-entity-ghost-background" data-ghost-url="https://static.licdn.com/aero-v1/sc/h/9c8pery4andzj6ohjkjp54ma2" alt="Thorsten Bertram"> <div class="base-main-card__info self-center ml-1 flex-1 relative break-words papabear:min-w-0 mamabear:min-w-0 babybear:w-full "> <!----> <h3 class="base-main-card__title font-sans text-[18px] font-bold text-color-text overflow-hidden "> Thorsten Bertram <!----> </h3> <h4 class="base-main-card__subtitle body-text text-color-text overflow-hidden "> Verbindungen und gute Gespräche entstehen durch Austausch, lass uns ins Gespräch kommen. </h4> <!----> <div class="body-text text-color-text-low-emphasis base-main-card__metadata"> <div class="review-card__content"> <div class="review-card__centered-row"> <div class="review-card__star-container"> <span class="star-rating" role="img" aria-label="Rating: 5 out of 5 stars"> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> </span> </div> <span class="review-card__rating"> 5/5 </span> <span class="review-card__date"> October 30, 2024 </span> </div> <div class="review-card__text"> I highly recommend this course as an outstanding introduction to technical security auditing! The content is well-structured, offering a clear and concise overview that’s perfect for anyone new to this area or looking to solidify foundational knowledge. It covers the key principles and essential practices. Engaging and practical – definitely worth the time! </div> <div class="review-card__centered-row review-card__actions"> <a class="review-card__centered-row review-card__action-button" aria-label="Thorsten Bertram’s comment is helpful" data-tracking-control-name="learning-course_review-card-helpful-button" data-tracking-will-navigate href="https://www.linkedin.com/learning-login/?redirect=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Flearning%2Fperforming-a-technical-security-audit-and-assessment-21079807%3Ftrk%3Dlearning-course_similar-courses%26trk%3Dlearning-course_similar-courses&amp;trk=learning-course_review-card-helpful-button" rel="nofollow"> <icon class="review-card__centered-row review-card__action-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/5ptx189gjbxrh9wf3ncsehms9" data-svg-class-name="review-card__like-icon"></icon> Helpful </a> <span class="review-card__dot-delimiter">·</span> <a class="review-card__centered-row review-card__action-button" aria-label="Report Thorsten Bertram’s comment" data-tracking-control-name="learning-course_review-card-report-button" data-tracking-will-navigate href="https://www.linkedin.com/learning-login/?redirect=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Flearning%2Fperforming-a-technical-security-audit-and-assessment-21079807%3Ftrk%3Dlearning-course_similar-courses%26trk%3Dlearning-course_similar-courses&amp;trk=learning-course_review-card-report-button" rel="nofollow"> <icon class="review-card__centered-row review-card__action-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/d04ze1wt0ev8ck8e4ovqk762o" data-svg-class-name="review-card__flag-icon"></icon> Report </a> </div> </div> </div> <!----> </div> <!----> </div> </div> </li> <li class="reviews-feed__reviews-list-item"> <div class="review-card"> <div class="base-card relative w-full hover:no-underline focus:no-underline base-card--link base-main-card flex flex-wrap py-2 pr-2 babybear:pr-0 base-main-card--link review-card__entity"> <a class="base-card__full-link absolute top-0 right-0 bottom-0 left-0 p-0 z-[2]" href="https://rw.linkedin.com/in/unganase-prosper-665911109" data-tracking-control-name="learning-course" data-tracking-will-navigate> <span class="sr-only"> Unganase Prosper <!----> </span> </a> <img class="inline-block relative rounded-[50%] w-6 h-6 " data-delayed-url="https://media.licdn.com/dms/image/v2/D4D03AQHVj-qQfvkDFQ/profile-displayphoto-shrink_100_100/profile-displayphoto-shrink_100_100/0/1690897668901?e=2147483647&amp;v=beta&amp;t=KRc4SILRvmG7YEyQBPzEKCm5dzJ5yZE7r0esCBGw0ZE" data-ghost-classes="bg-color-entity-ghost-background" data-ghost-url="https://static.licdn.com/aero-v1/sc/h/9c8pery4andzj6ohjkjp54ma2" alt="Unganase Prosper"> <div class="base-main-card__info self-center ml-1 flex-1 relative break-words papabear:min-w-0 mamabear:min-w-0 babybear:w-full "> <!----> <h3 class="base-main-card__title font-sans text-[18px] font-bold text-color-text overflow-hidden "> Unganase Prosper <!----> </h3> <h4 class="base-main-card__subtitle body-text text-color-text overflow-hidden "> Senior Core T24 System Administrator </h4> <!----> <div class="body-text text-color-text-low-emphasis base-main-card__metadata"> <div class="review-card__content"> <div class="review-card__centered-row"> <div class="review-card__star-container"> <span class="star-rating" role="img" aria-label="Rating: 5 out of 5 stars"> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> <span class="star-rating__icon-container" aria-hidden="true"> <icon class="star-rating__icon star-rating__icon--small " data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cg0ud3t24av7pe8eamnp39hfq"></icon> </span> </span> </div> <span class="review-card__rating"> 5/5 </span> <span class="review-card__date"> July 3, 2024 </span> </div> <div class="review-card__text"> i can recommend </div> <div class="review-card__centered-row review-card__actions"> <a class="review-card__centered-row review-card__action-button" aria-label="Unganase Prosper’s comment is helpful" data-tracking-control-name="learning-course_review-card-helpful-button" data-tracking-will-navigate href="https://www.linkedin.com/learning-login/?redirect=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Flearning%2Fperforming-a-technical-security-audit-and-assessment-21079807%3Ftrk%3Dlearning-course_similar-courses%26trk%3Dlearning-course_similar-courses&amp;trk=learning-course_review-card-helpful-button" rel="nofollow"> <icon class="review-card__centered-row review-card__action-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/5ptx189gjbxrh9wf3ncsehms9" data-svg-class-name="review-card__like-icon"></icon> Helpful </a> <span class="review-card__dot-delimiter">·</span> <a class="review-card__centered-row review-card__action-button" aria-label="Report Unganase Prosper’s comment" data-tracking-control-name="learning-course_review-card-report-button" data-tracking-will-navigate href="https://www.linkedin.com/learning-login/?redirect=https%3A%2F%2Fwww%2Elinkedin%2Ecom%2Flearning%2Fperforming-a-technical-security-audit-and-assessment-21079807%3Ftrk%3Dlearning-course_similar-courses%26trk%3Dlearning-course_similar-courses&amp;trk=learning-course_review-card-report-button" rel="nofollow"> <icon class="review-card__centered-row review-card__action-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/d04ze1wt0ev8ck8e4ovqk762o" data-svg-class-name="review-card__flag-icon"></icon> Report </a> </div> </div> </div> <!----> </div> <!----> </div> </div> </li> </ul> </div> </section> </div> </section> <section class="right-rail papabear:w-right-rail-width papabear:ml-column-gutter mamabear:max-w-[790px] mamabear:px-mobile-container-padding babybear:max-w-[790px] babybear:px-mobile-container-padding"> <section class="table-of-contents mb-4 table-of-contents--with-max-height"> <h2 class="table-of-contents__header"> Contents </h2> <ul class="table-of-contents__list"> <li class="toc-section"> <div class="show-more-less"> <button class="show-more-less__button show-more-less__more-button show-more-less-button " aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> Introduction <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cyolgscd0imw2ldqppkrb84vo"></icon> </button> <button class="show-more-less__button show-more-less__less-button show-more-less-button show-more-less__button--hide" aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> Introduction <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/4chtt12k98xwnba1nimld2oyg"></icon> </button> <ul data-max-num-to-show="0" class="show-more-less__list show-more-less__list--hide-after-0" data-impression-id="learning-course_toc-section_show-more-less"> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/understanding-technical-security-audits-and-assessments?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <icon class="table-of-contents__item-status table-of-contents__item-status--unlocked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/5jwhkytplzxiejvhzfu0t7m8l" data-svg-class-name="table-of-contents__item-status-svg--unlocked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Understanding technical security audits and assessments </div> <div class="table-of-contents__item-duration"> 44s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/what-are-technical-security-assessments?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <icon class="table-of-contents__item-status table-of-contents__item-status--unlocked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/5jwhkytplzxiejvhzfu0t7m8l" data-svg-class-name="table-of-contents__item-status-svg--unlocked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> What are technical security assessments? </div> <div class="table-of-contents__item-duration"> 1m 18s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/who-this-course-is-for?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <icon class="table-of-contents__item-status table-of-contents__item-status--unlocked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/5jwhkytplzxiejvhzfu0t7m8l" data-svg-class-name="table-of-contents__item-status-svg--unlocked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Who this course is for </div> <div class="table-of-contents__item-duration"> 51s </div> </div> </a> </li> </ul> <!----> </div> </li> <li class="toc-section"> <div class="show-more-less"> <button class="show-more-less__button show-more-less__more-button show-more-less-button " aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> 1. Overview of Technical Security Assessments <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cyolgscd0imw2ldqppkrb84vo"></icon> </button> <button class="show-more-less__button show-more-less__less-button show-more-less-button show-more-less__button--hide" aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> 1. Overview of Technical Security Assessments <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/4chtt12k98xwnba1nimld2oyg"></icon> </button> <ul data-max-num-to-show="0" class="show-more-less__list show-more-less__list--hide-after-0" data-impression-id="learning-course_toc-section_show-more-less"> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/develop-a-technical-security-assessment-methodology?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Develop a technical security assessment methodology </div> <div class="table-of-contents__item-duration"> 2m 54s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/overview-of-technical-security-assessment-techniques?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <icon class="table-of-contents__item-status table-of-contents__item-status--unlocked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/5jwhkytplzxiejvhzfu0t7m8l" data-svg-class-name="table-of-contents__item-status-svg--unlocked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Overview of technical security assessment techniques </div> <div class="table-of-contents__item-duration"> 1m 31s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/select-your-testing-viewpoint?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Select your testing viewpoint </div> <div class="table-of-contents__item-duration"> 4m 5s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/challenge-pick-the-right-technical-security-assessment?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Challenge: Pick the right technical security assessment </div> <div class="table-of-contents__item-duration"> 1m 9s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/solution-pick-the-right-technical-security-assessment?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Solution: Pick the right technical security assessment </div> <div class="table-of-contents__item-duration"> 54s </div> </div> </a> </li> </ul> <!----> </div> </li> <li class="toc-section"> <div class="show-more-less"> <button class="show-more-less__button show-more-less__more-button show-more-less-button " aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> 2. Conduct Technical Security Reviews <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cyolgscd0imw2ldqppkrb84vo"></icon> </button> <button class="show-more-less__button show-more-less__less-button show-more-less-button show-more-less__button--hide" aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> 2. Conduct Technical Security Reviews <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/4chtt12k98xwnba1nimld2oyg"></icon> </button> <ul data-max-num-to-show="0" class="show-more-less__list show-more-less__list--hide-after-0" data-impression-id="learning-course_toc-section_show-more-less"> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/baseline-skill-sets-for-security-reviews?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <icon class="table-of-contents__item-status table-of-contents__item-status--unlocked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/5jwhkytplzxiejvhzfu0t7m8l" data-svg-class-name="table-of-contents__item-status-svg--unlocked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Baseline skill sets for security reviews </div> <div class="table-of-contents__item-duration"> 2m 21s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-documentation-reviews?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Conduct documentation reviews </div> <div class="table-of-contents__item-duration"> 1m 58s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-log-reviews?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Conduct log reviews </div> <div class="table-of-contents__item-duration"> 2m 8s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-ruleset-reviews?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Conduct ruleset reviews </div> <div class="table-of-contents__item-duration"> 2m 18s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-system-configuration-reviews?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Conduct system configuration reviews </div> <div class="table-of-contents__item-duration"> 2m 51s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-network-sniffing?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Conduct network sniffing </div> <div class="table-of-contents__item-duration"> 1m 19s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/network-sniffing-tool-demo-wireshark?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Network sniffing tool demo: Wireshark </div> <div class="table-of-contents__item-duration"> 2m 16s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-file-integrity-checking?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Conduct file integrity checking </div> <div class="table-of-contents__item-duration"> 2m 39s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/file-integrity-checking-tool-demo?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <icon class="table-of-contents__item-status table-of-contents__item-status--unlocked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/5jwhkytplzxiejvhzfu0t7m8l" data-svg-class-name="table-of-contents__item-status-svg--unlocked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> File integrity checking tool demo </div> <div class="table-of-contents__item-duration"> 1m 21s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/challenge-pick-the-right-reviews?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Challenge: Pick the right reviews </div> <div class="table-of-contents__item-duration"> 1m 6s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/solution-pick-the-right-reviews?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Solution: Pick the right reviews </div> <div class="table-of-contents__item-duration"> 2m 37s </div> </div> </a> </li> </ul> <!----> </div> </li> <li class="toc-section"> <div class="show-more-less"> <button class="show-more-less__button show-more-less__more-button show-more-less-button " aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> 3. Identify and Analyze Targets <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cyolgscd0imw2ldqppkrb84vo"></icon> </button> <button class="show-more-less__button show-more-less__less-button show-more-less-button show-more-less__button--hide" aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> 3. Identify and Analyze Targets <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/4chtt12k98xwnba1nimld2oyg"></icon> </button> <ul data-max-num-to-show="0" class="show-more-less__list show-more-less__list--hide-after-0" data-impression-id="learning-course_toc-section_show-more-less"> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/baseline-skill-sets-target-identification-and-analysis?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Baseline skill sets target identification and analysis </div> <div class="table-of-contents__item-duration"> 2m 22s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-network-discovery?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Conduct network discovery </div> <div class="table-of-contents__item-duration"> 2m 25s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/network-discovery-tool-demo?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Network discovery tool demo </div> <div class="table-of-contents__item-duration"> 2m 43s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/challenge-install-and-run-nmap?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Challenge: Install and run Nmap </div> <div class="table-of-contents__item-duration"> 52s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/solution-install-and-run-nmap?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Solution: Install and run Nmap </div> <div class="table-of-contents__item-duration"> 2m 25s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/identify-network-ports-and-services?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Identify network ports and services </div> <div class="table-of-contents__item-duration"> 1m 49s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/network-ports-and-services-discovery-tool-demo?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Network ports and services discovery tool demo </div> <div class="table-of-contents__item-duration"> 3m 13s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/scan-for-vulnerabilities?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Scan for vulnerabilities </div> <div class="table-of-contents__item-duration"> 3m 40s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/vulnerability-scanning-tool-demo?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Vulnerability scanning tool demo </div> <div class="table-of-contents__item-duration"> 3m 17s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/scan-wireless-networks?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Scan wireless networks </div> <div class="table-of-contents__item-duration"> 4m 5s </div> </div> </a> </li> </ul> <!----> </div> </li> <li class="toc-section"> <div class="show-more-less"> <button class="show-more-less__button show-more-less__more-button show-more-less-button " aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> 4. Validate Target Vulnerabilities <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cyolgscd0imw2ldqppkrb84vo"></icon> </button> <button class="show-more-less__button show-more-less__less-button show-more-less-button show-more-less__button--hide" aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> 4. Validate Target Vulnerabilities <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/4chtt12k98xwnba1nimld2oyg"></icon> </button> <ul data-max-num-to-show="0" class="show-more-less__list show-more-less__list--hide-after-0" data-impression-id="learning-course_toc-section_show-more-less"> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/baseline-skill-sets-for-target-vulnerability-validation?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Baseline skill sets for target vulnerability validation </div> <div class="table-of-contents__item-duration"> 49s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/crack-passwords?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Crack passwords </div> <div class="table-of-contents__item-duration"> 1m 53s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/password-cracking-tool-demo?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <icon class="table-of-contents__item-status table-of-contents__item-status--unlocked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/5jwhkytplzxiejvhzfu0t7m8l" data-svg-class-name="table-of-contents__item-status-svg--unlocked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Password cracking tool demo </div> <div class="table-of-contents__item-duration"> 3m 23s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/challenge-install-and-run-a-password-cracker?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Challenge: Install and run a password cracker </div> <div class="table-of-contents__item-duration"> 1m 3s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/solution-install-and-run-a-password-cracker?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Solution: Install and run a password cracker </div> <div class="table-of-contents__item-duration"> 2m 27s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-penetration-tests?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Conduct penetration tests </div> <div class="table-of-contents__item-duration"> 3m 3s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/penetration-testing-tool-demo?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Penetration testing tool demo </div> <div class="table-of-contents__item-duration"> 2m 46s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-social-engineering?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Conduct social engineering </div> <div class="table-of-contents__item-duration"> 1m 15s </div> </div> </a> </li> </ul> <!----> </div> </li> <li class="toc-section"> <div class="show-more-less"> <button class="show-more-less__button show-more-less__more-button show-more-less-button " aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> 5. Planning Technical Security Assessments <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cyolgscd0imw2ldqppkrb84vo"></icon> </button> <button class="show-more-less__button show-more-less__less-button show-more-less-button show-more-less__button--hide" aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> 5. Planning Technical Security Assessments <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/4chtt12k98xwnba1nimld2oyg"></icon> </button> <ul data-max-num-to-show="0" class="show-more-less__list show-more-less__list--hide-after-0" data-impression-id="learning-course_toc-section_show-more-less"> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/develop-a-security-assessment-policy?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Develop a security assessment policy </div> <div class="table-of-contents__item-duration"> 1m 10s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/prioritize-and-schedule-the-assessments?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Prioritize and schedule the assessments </div> <div class="table-of-contents__item-duration"> 2m 7s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/select-and-customize-techniques?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Select and customize techniques </div> <div class="table-of-contents__item-duration"> 2m 38s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/select-the-assessors?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Select the assessors </div> <div class="table-of-contents__item-duration"> 1m 36s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/select-the-location?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Select the location </div> <div class="table-of-contents__item-duration"> 1m 42s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/select-tools-and-resources?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Select tools and resources </div> <div class="table-of-contents__item-duration"> 1m 33s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/develop-the-assessment-plan?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Develop the assessment plan </div> <div class="table-of-contents__item-duration"> 1m 27s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/challenge-write-a-security-assessment-methodology?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Challenge: Write a security assessment methodology </div> <div class="table-of-contents__item-duration"> 1m 29s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/solution-write-a-security-assessment-methodology?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Solution: Write a security assessment methodology </div> <div class="table-of-contents__item-duration"> 58s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/legal-considerations?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Legal considerations </div> <div class="table-of-contents__item-duration"> 1m 6s </div> </div> </a> </li> </ul> <!----> </div> </li> <li class="toc-section"> <div class="show-more-less"> <button class="show-more-less__button show-more-less__more-button show-more-less-button " aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> 6. Executing the Technical Security Assessment <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cyolgscd0imw2ldqppkrb84vo"></icon> </button> <button class="show-more-less__button show-more-less__less-button show-more-less-button show-more-less__button--hide" aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> 6. Executing the Technical Security Assessment <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/4chtt12k98xwnba1nimld2oyg"></icon> </button> <ul data-max-num-to-show="0" class="show-more-less__list show-more-less__list--hide-after-0" data-impression-id="learning-course_toc-section_show-more-less"> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/coordinate-the-assessment?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Coordinate the assessment </div> <div class="table-of-contents__item-duration"> 1m 31s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-the-assessment?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Conduct the assessment </div> <div class="table-of-contents__item-duration"> 1m 19s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/conduct-the-analysis?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Conduct the analysis </div> <div class="table-of-contents__item-duration"> 2m 17s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/challenge-categorize-assessment-findings?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Challenge: Categorize assessment findings </div> <div class="table-of-contents__item-duration"> 1m 42s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/solution-categorize-assessment-findings?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Solution: Categorize assessment findings </div> <div class="table-of-contents__item-duration"> 2m 23s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/data-handling-considerations?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Data handling considerations </div> <div class="table-of-contents__item-duration"> 1m 17s </div> </div> </a> </li> </ul> <!----> </div> </li> <li class="toc-section"> <div class="show-more-less"> <button class="show-more-less__button show-more-less__more-button show-more-less-button " aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> 7. Post-Testing Activities <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cyolgscd0imw2ldqppkrb84vo"></icon> </button> <button class="show-more-less__button show-more-less__less-button show-more-less-button show-more-less__button--hide" aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> 7. Post-Testing Activities <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/4chtt12k98xwnba1nimld2oyg"></icon> </button> <ul data-max-num-to-show="0" class="show-more-less__list show-more-less__list--hide-after-0" data-impression-id="learning-course_toc-section_show-more-less"> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/recommend-mitigation-actions?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Recommend mitigation actions </div> <div class="table-of-contents__item-duration"> 1m 15s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/challenge-recommend-mitigation-actions?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Challenge: Recommend mitigation actions </div> <div class="table-of-contents__item-duration"> 1m 5s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/solution-recommend-mitigation-actions?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Solution: Recommend mitigation actions </div> <div class="table-of-contents__item-duration"> 1m 59s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/report-the-results?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Report the results </div> <div class="table-of-contents__item-duration"> 1m 24s </div> </div> </a> </li> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/implement-remediation-and-mitigation?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Implement remediation and mitigation </div> <div class="table-of-contents__item-duration"> 1m 51s </div> </div> </a> </li> </ul> <!----> </div> </li> <li class="toc-section"> <div class="show-more-less"> <button class="show-more-less__button show-more-less__more-button show-more-less-button " aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> Conclusion <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cyolgscd0imw2ldqppkrb84vo"></icon> </button> <button class="show-more-less__button show-more-less__less-button show-more-less-button show-more-less__button--hide" aria-expanded="false" data-tracking-control-name="learning-course_toc-section_show_more"> Conclusion <icon class="show-more-less__button--chevron show-more-less-button-icon" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/4chtt12k98xwnba1nimld2oyg"></icon> </button> <ul data-max-num-to-show="0" class="show-more-less__list show-more-less__list--hide-after-0" data-impression-id="learning-course_toc-section_show-more-less"> <li class="toc-item"> <a data-tracking-control-name="learning-course_tocItem" data-tracking-will-navigate href="https://www.linkedin.com/learning/performing-a-technical-security-audit-and-assessment-21079807/begin-your-testing-journey?autoplay=true&amp;trk=learning-course_tocItem" class="toc-item__link" aria-current="false"> <span class="a11y-text">(Locked)</span> <icon class="table-of-contents__item-status table-of-contents__item-status--locked" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cfu0devb5o77ym5x8vv0oilfz" data-svg-class-name="table-of-contents__item-status-svg--locked"></icon> <div class="table-of-contents__item-details"> <div class="table-of-contents__item-title"> Begin your testing journey </div> <div class="table-of-contents__item-duration"> 45s </div> </div> </a> </li> </ul> <!----> </div> </li> </ul> </section> <section class="aside-section-container mb-4 subscription-value-props-aside-section"> <h2 class="aside-section-container__title section-title"> What’s included </h2> <!----> <div class="aside-section-container__content break-words"> <ul> <li class="subscription-value-props-aside-section__list-item"> <span class="subscription-value-props-aside-section__value-prop-label">Practice while you learn</span> <span class="subscription-value-props-aside-section__value-prop-sublabel">1 exercise file</span> </li> <li class="subscription-value-props-aside-section__list-item"> <span class="subscription-value-props-aside-section__value-prop-label">Test your knowledge</span> <span class="subscription-value-props-aside-section__value-prop-sublabel">7 quizzes</span> </li> <li class="subscription-value-props-aside-section__list-item"> <span class="subscription-value-props-aside-section__value-prop-label">Learn on the go</span> <span class="subscription-value-props-aside-section__value-prop-sublabel">Access on tablet and phone</span> </li> <!----> </ul> </div> </section> <section class="aside-section-container mb-4 similar-courses-aside-section"> <h2 class="aside-section-container__title section-title"> Similar courses </h2> <!----> <div class="aside-section-container__content break-words"> <ul> <li> <!----> <a href="https://www.linkedin.com/learning/ethical-hacking-enumeration-13945377?trk=learning-course_similar-courses" target="_self" data-tracking-control-name="learning-course_similar-courses" data-tracking-will-navigate class="base-card relative w-full hover:no-underline focus:no-underline base-card--link base-aside-card flex my-1.5 hover:show-play-button focus:show-play-button base-aside-card--link aside-learning-course-card"> <!----> <div class="base-aside-card__media flex-shrink-0 mr-0.5 overflow-hidden relative rounded-md h-[54px] w-[95px]"> <img class="base-aside-card__media-element w-[100px] h-full object-cover" alt data-delayed-url="https://media.licdn.com/dms/image/v2/C560DAQH4q52rvtzUqg/learning-public-crop_144_256/learning-public-crop_144_256/0/1620842870509?e=2147483647&amp;v=beta&amp;t=zBbL0HKYdkvLK-NEgHf7PSU_5yKrvb4YeiFJydTqUBo"> <div class="aside-learning-course-card__duration duration">2h 12m</div> <icon class="base-aside-card__play-button w-auto play-button overlay-center" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/9n9raq7fmdu241tpsxwodsmcd" data-svg-class-name="base-aside-card__play-button-svg"></icon> </div> <div class="base-aside-card__info self-center pl-0.5 flex flex-col flex-1"> <h3 class="base-aside-card__title font-sans text-md font-bold text-color-text relative"> Ethical Hacking: Enumeration <!----> </h3> <!----> <!----> <!----> <!----> <!----> </div> <!----> </a> </li> <li> <!----> <a href="https://www.linkedin.com/learning/ethical-hacking-wireless-networks?trk=learning-course_similar-courses" target="_self" data-tracking-control-name="learning-course_similar-courses" data-tracking-will-navigate class="base-card relative w-full hover:no-underline focus:no-underline base-card--link base-aside-card flex my-1.5 hover:show-play-button focus:show-play-button base-aside-card--link aside-learning-course-card"> <!----> <div class="base-aside-card__media flex-shrink-0 mr-0.5 overflow-hidden relative rounded-md h-[54px] w-[95px]"> <img class="base-aside-card__media-element w-[100px] h-full object-cover" alt data-delayed-url="https://media.licdn.com/dms/image/v2/C4E0DAQEKzuxJOFSiTA/learning-public-crop_144_256/learning-public-crop_144_256/0/1571074401590?e=2147483647&amp;v=beta&amp;t=WQGUgKPI0E9cOrAkczdnrjI1AN3rYdXUmrhleDNIDAo"> <div class="aside-learning-course-card__duration duration">1h 45m</div> <icon class="base-aside-card__play-button w-auto play-button overlay-center" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/9n9raq7fmdu241tpsxwodsmcd" data-svg-class-name="base-aside-card__play-button-svg"></icon> </div> <div class="base-aside-card__info self-center pl-0.5 flex flex-col flex-1"> <h3 class="base-aside-card__title font-sans text-md font-bold text-color-text relative"> Ethical Hacking: Wireless Networks <!----> </h3> <!----> <!----> <!----> <!----> <!----> </div> <!----> </a> </li> <li> <!----> <a href="https://www.linkedin.com/learning/practical-cybersecurity-for-it-professionals?trk=learning-course_similar-courses" target="_self" data-tracking-control-name="learning-course_similar-courses" data-tracking-will-navigate class="base-card relative w-full hover:no-underline focus:no-underline base-card--link base-aside-card flex my-1.5 hover:show-play-button focus:show-play-button base-aside-card--link aside-learning-course-card"> <!----> <div class="base-aside-card__media flex-shrink-0 mr-0.5 overflow-hidden relative rounded-md h-[54px] w-[95px]"> <img class="base-aside-card__media-element w-[100px] h-full object-cover" alt data-delayed-url="https://media.licdn.com/dms/image/v2/C560DAQHkzm_evdXHzA/learning-public-crop_144_256/learning-public-crop_144_256/0/1651516598008?e=2147483647&amp;v=beta&amp;t=Suh7oZjw4e_j_6rpCP5OjdmKQ4QDhiywyd_xhqsRCx4"> <div class="aside-learning-course-card__duration duration">2h 56m</div> <icon class="base-aside-card__play-button w-auto play-button overlay-center" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/9n9raq7fmdu241tpsxwodsmcd" data-svg-class-name="base-aside-card__play-button-svg"></icon> </div> <div class="base-aside-card__info self-center pl-0.5 flex flex-col flex-1"> <h3 class="base-aside-card__title font-sans text-md font-bold text-color-text relative"> Practical Cybersecurity for IT Professionals <!----> </h3> <!----> <!----> <!----> <!----> <!----> </div> <!----> </a> </li> </ul> </div> </section> <section class="aside-section-container mb-4"> <h2 class="aside-section-container__title section-title"> Download courses </h2> <!----> <div class="aside-section-container__content break-words"> <p>Use your iOS or Android LinkedIn Learning app, and watch courses on your mobile device without an internet connection.</p> <div class="app-links-aside-section__link-container"> <a class="app-links-aside-section__link" href="https://itunes.apple.com/app/apple-store/id1084807225?ls=1&amp;pt=10746&amp;mt=8&amp;ct=learning_course_app_links&amp;trk=learning-course_apple-app-store" data-tracking-control-name="learning-course_apple-app-store" data-tracking-will-navigate rel="noopener noreferrer" target="_blank"> <img alt="Download on the App Store" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/emczv26hz24woii2j4aleyry" height="42px" width="142px"> </a> <a class="app-links-aside-section__link" href="https://play.google.com/store/apps/details?id=com.linkedin.android.learning&amp;referrer=utm_source%3Dlinkedinlearning%26utm_medium%3DmobileWeb%26utm_campaign%3Dlearning_guest&amp;ct=learning_course_app_links&amp;trk=learning-course_google-play-store" data-tracking-control-name="learning-course_google-play-store" data-tracking-will-navigate rel="noopener noreferrer" target="_blank"> <img alt="Get it on Google Play" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/535kqf5rsexfx0lucb3t6palb" height="42px" width="142px"> </a> </div> </div> </section> </section> </main> <div class="pre-footer "> <section class="core-section-container my-3 price-disclaimer"> <!----> <!----> <!----> <div class="core-section-container__content break-words"> <p class="price-disclaimer__copy"> <sup class="price-disclaimer__copy--sup">*</sup>Price may change based on profile and billing country information entered during Sign In or Registration </p> </div> </section> <section class="tw-linkster bg-cool-gray-20 browse-map" data-impression-id="learning-course_linkster" data-js-module-id="linkster"> <div class="max-w-screen-content-max-w w-full flex justify-between my-0 mx-auto mamabear:px-3 babybear:px-2 babybear:flex-col"> <div class="flex-1 w-1/2 pt-2 pr-4 pb-4 pl-0 babybear:pb-2 babybear:w-full babybear:border-b-1 babybear:border-solid babybear:border-color-border-low-emphasis babybear:last:border-b-0"> <h3 class="text-md font-bold text-color-text leading-open"> Explore Business Topics </h3> <ul class="my-1"> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/business-analysis-and-strategy?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Business Analysis and Strategy </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/business-software-and-tools?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Business Software and Tools </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/career-development-5?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Career Development </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/customer-service-3?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Customer Service </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/diversity-equity-and-inclusion-dei?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Diversity, Equity, and Inclusion (DEI) </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/finance-and-accounting?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Finance and Accounting </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/human-resources-3?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Human Resources </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/leadership-and-management?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Leadership and Management </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/marketing-2?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Marketing </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/professional-development?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Professional Development </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/project-management?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Project Management </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/sales-3?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Sales </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/small-business-and-entrepreneurship?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Small Business and Entrepreneurship </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/training-and-education?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Training and Education </a> </li> </ul> <a class="link tw-linkster-general-link" aria-label="See all business courses" href="https://www.linkedin.com/learning/topics/business?trk=learning-course_browsemap_general-link" data-tracking-control-name="learning-course_browsemap_general-link" data-tracking-will-navigate> See all </a> </div> <div class="flex-1 w-1/2 pt-2 pr-4 pb-4 pl-0 babybear:pb-2 babybear:w-full babybear:border-b-1 babybear:border-solid babybear:border-color-border-low-emphasis babybear:last:border-b-0"> <h3 class="text-md font-bold text-color-text leading-open"> Explore Creative Topics </h3> <ul class="my-1"> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/aec?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> AEC </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/animation-and-illustration?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Animation and Illustration </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/audio-and-music?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Audio and Music </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/graphic-design?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Graphic Design </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/motion-graphics-and-vfx?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Motion Graphics and VFX </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/photography-2?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Photography </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/product-and-manufacturing?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Product and Manufacturing </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/user-experience?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> User Experience </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/2015-54?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Video </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/visualization-and-real-time?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Visualization and Real-Time </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/web-design?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Web Design </a> </li> </ul> <a class="link tw-linkster-general-link" aria-label="See all creative courses" href="https://www.linkedin.com/learning/topics/creative?trk=learning-course_browsemap_general-link" data-tracking-control-name="learning-course_browsemap_general-link" data-tracking-will-navigate> See all </a> </div> <div class="flex-1 w-1/2 pt-2 pr-4 pb-4 pl-0 babybear:pb-2 babybear:w-full babybear:border-b-1 babybear:border-solid babybear:border-color-border-low-emphasis babybear:last:border-b-0"> <h3 class="text-md font-bold text-color-text leading-open"> Explore Technology Topics </h3> <ul class="my-1"> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/artificial-intelligence?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Artificial Intelligence (AI) </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/cloud-computing-5?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Cloud Computing </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/security-3?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Cybersecurity </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/data-science?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Data Science </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/database-management?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Database Management </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/devops?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> DevOps </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/hardware?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Hardware </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/it-help-desk-5?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> IT Help Desk </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/mobile-development?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Mobile Development </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/network-and-system-administration?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Network and System Administration </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/software-development?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Software Development </a> </li> <li class="tw-link-column-item"> <a class="link tw-linkster-link" href="https://www.linkedin.com/learning/topics/web-development?trk=learning-course_browsemap_link" data-js-module-id="link-column-link" data-tracking-control-name="learning-course_browsemap_link" data-tracking-will-navigate> Web Development </a> </li> </ul> <a class="link tw-linkster-general-link" aria-label="See all technology courses" href="https://www.linkedin.com/learning/topics/technology?trk=learning-course_browsemap_general-link" data-tracking-control-name="learning-course_browsemap_general-link" data-tracking-will-navigate> See all </a> </div> </div> </section> </div> <footer class="li-footer bg-transparent w-full "> <ul class="li-footer__list flex flex-wrap flex-row items-start justify-start w-full h-auto min-h-[50px] my-[0px] mx-auto py-3 px-2 papabear:w-[1128px] papabear:p-0"> <li class="li-footer__item font-sans text-xs text-color-text-solid-secondary flex flex-shrink-0 justify-start p-1 relative w-50% papabear:justify-center papabear:w-auto"> <span class="sr-only">LinkedIn</span> <icon class="li-footer__copy-logo text-color-logo-brand-alt inline-block self-center h-[14px] w-[56px] mr-1" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/e12h2cd8ac580qen9qdd0qks8"></icon> <span class="li-footer__copy-text flex items-center">&copy; 2025</span> </li> <li class="li-footer__item font-sans text-xs text-color-text-solid-secondary flex flex-shrink-0 justify-start p-1 relative w-50% papabear:justify-center papabear:w-auto"> <a class="li-footer__item-link flex items-center font-sans text-xs font-bold text-color-text-solid-secondary hover:text-color-link-hover focus:text-color-link-focus" href="https://about.linkedin.com?trk=d_learning_course_guest_footer-about" data-tracking-control-name="d_learning_course_guest_footer-about" data-tracking-will-navigate> About </a> </li> <li class="li-footer__item font-sans text-xs text-color-text-solid-secondary flex flex-shrink-0 justify-start p-1 relative w-50% papabear:justify-center papabear:w-auto"> <a class="li-footer__item-link flex items-center font-sans text-xs font-bold text-color-text-solid-secondary hover:text-color-link-hover focus:text-color-link-focus" href="https://www.linkedin.com/accessibility?trk=d_learning_course_guest_footer-accessibility" data-tracking-control-name="d_learning_course_guest_footer-accessibility" data-tracking-will-navigate> Accessibility </a> </li> <li class="li-footer__item font-sans text-xs text-color-text-solid-secondary flex flex-shrink-0 justify-start p-1 relative w-50% papabear:justify-center papabear:w-auto"> <a class="li-footer__item-link flex items-center font-sans text-xs font-bold text-color-text-solid-secondary hover:text-color-link-hover focus:text-color-link-focus" href="https://www.linkedin.com/legal/user-agreement?trk=d_learning_course_guest_footer-user-agreement" data-tracking-control-name="d_learning_course_guest_footer-user-agreement" data-tracking-will-navigate> User Agreement </a> </li> <li class="li-footer__item font-sans text-xs text-color-text-solid-secondary flex flex-shrink-0 justify-start p-1 relative w-50% papabear:justify-center papabear:w-auto"> <a class="li-footer__item-link flex items-center font-sans text-xs font-bold text-color-text-solid-secondary hover:text-color-link-hover focus:text-color-link-focus" href="https://www.linkedin.com/legal/privacy-policy?trk=d_learning_course_guest_footer-privacy-policy" data-tracking-control-name="d_learning_course_guest_footer-privacy-policy" data-tracking-will-navigate> Privacy Policy </a> </li> <!----> <li class="li-footer__item font-sans text-xs text-color-text-solid-secondary flex flex-shrink-0 justify-start p-1 relative w-50% papabear:justify-center papabear:w-auto"> <a class="li-footer__item-link flex items-center font-sans text-xs font-bold text-color-text-solid-secondary hover:text-color-link-hover focus:text-color-link-focus" href="https://www.linkedin.com/legal/cookie-policy?trk=d_learning_course_guest_footer-cookie-policy" data-tracking-control-name="d_learning_course_guest_footer-cookie-policy" data-tracking-will-navigate> Cookie Policy </a> </li> <li class="li-footer__item font-sans text-xs text-color-text-solid-secondary flex flex-shrink-0 justify-start p-1 relative w-50% papabear:justify-center papabear:w-auto"> <a class="li-footer__item-link flex items-center font-sans text-xs font-bold text-color-text-solid-secondary hover:text-color-link-hover focus:text-color-link-focus" href="https://www.linkedin.com/legal/copyright-policy?trk=d_learning_course_guest_footer-copyright-policy" data-tracking-control-name="d_learning_course_guest_footer-copyright-policy" data-tracking-will-navigate> Copyright Policy </a> </li> <li class="li-footer__item font-sans text-xs text-color-text-solid-secondary flex flex-shrink-0 justify-start p-1 relative w-50% papabear:justify-center papabear:w-auto"> <a class="li-footer__item-link flex items-center font-sans text-xs font-bold text-color-text-solid-secondary hover:text-color-link-hover focus:text-color-link-focus" href="https://brand.linkedin.com/policies?trk=d_learning_course_guest_footer-brand-policy" data-tracking-control-name="d_learning_course_guest_footer-brand-policy" data-tracking-will-navigate> Brand Policy </a> </li> <li class="li-footer__item font-sans text-xs text-color-text-solid-secondary flex flex-shrink-0 justify-start p-1 relative w-50% papabear:justify-center papabear:w-auto"> <a class="li-footer__item-link flex items-center font-sans text-xs font-bold text-color-text-solid-secondary hover:text-color-link-hover focus:text-color-link-focus" href="https://www.linkedin.com/psettings/guest-controls?trk=d_learning_course_guest_footer-guest-controls" data-tracking-control-name="d_learning_course_guest_footer-guest-controls" data-tracking-will-navigate> Guest Controls </a> </li> <li class="li-footer__item font-sans text-xs text-color-text-solid-secondary flex flex-shrink-0 justify-start p-1 relative w-50% papabear:justify-center papabear:w-auto"> <a class="li-footer__item-link flex items-center font-sans text-xs font-bold text-color-text-solid-secondary hover:text-color-link-hover focus:text-color-link-focus" href="https://www.linkedin.com/legal/professional-community-policies?trk=d_learning_course_guest_footer-community-guide" data-tracking-control-name="d_learning_course_guest_footer-community-guide" data-tracking-will-navigate> Community Guidelines </a> </li> <!----> <li class="li-footer__item font-sans text-xs text-color-text-solid-secondary flex flex-shrink-0 justify-start p-1 relative w-50% papabear:justify-center papabear:w-auto"> <div class="collapsible-dropdown collapsible-dropdown--footer collapsible-dropdown--up flex items-center relative hyphens-auto language-selector z-2"> <!----> <ul class="collapsible-dropdown__list hidden container-raised absolute w-auto overflow-y-auto flex-col items-stretch z-1 bottom-[100%] top-auto" role="menu" tabindex="-1"> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="العربية (Arabic)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-ar_AE" data-locale="ar_AE" role="menuitem" lang="ar_AE"> العربية (Arabic) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="বাংলা (Bangla)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-bn_IN" data-locale="bn_IN" role="menuitem" lang="bn_IN"> বাংলা (Bangla) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Čeština (Czech)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-cs_CZ" data-locale="cs_CZ" role="menuitem" lang="cs_CZ"> Čeština (Czech) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Dansk (Danish)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-da_DK" data-locale="da_DK" role="menuitem" lang="da_DK"> Dansk (Danish) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Deutsch (German)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-de_DE" data-locale="de_DE" role="menuitem" lang="de_DE"> Deutsch (German) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Ελληνικά (Greek)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-el_GR" data-locale="el_GR" role="menuitem" lang="el_GR"> Ελληνικά (Greek) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="English (English) selected" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link--selected" data-tracking-control-name="language-selector-en_US" data-locale="en_US" role="menuitem" lang="en_US"> <strong>English (English)</strong> </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Español (Spanish)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-es_ES" data-locale="es_ES" role="menuitem" lang="es_ES"> Español (Spanish) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="فارسی (Persian)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-fa_IR" data-locale="fa_IR" role="menuitem" lang="fa_IR"> فارسی (Persian) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Suomi (Finnish)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-fi_FI" data-locale="fi_FI" role="menuitem" lang="fi_FI"> Suomi (Finnish) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Français (French)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-fr_FR" data-locale="fr_FR" role="menuitem" lang="fr_FR"> Français (French) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="हिंदी (Hindi)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-hi_IN" data-locale="hi_IN" role="menuitem" lang="hi_IN"> हिंदी (Hindi) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Magyar (Hungarian)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-hu_HU" data-locale="hu_HU" role="menuitem" lang="hu_HU"> Magyar (Hungarian) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Bahasa Indonesia (Indonesian)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-in_ID" data-locale="in_ID" role="menuitem" lang="in_ID"> Bahasa Indonesia (Indonesian) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Italiano (Italian)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-it_IT" data-locale="it_IT" role="menuitem" lang="it_IT"> Italiano (Italian) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="עברית (Hebrew)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-iw_IL" data-locale="iw_IL" role="menuitem" lang="iw_IL"> עברית (Hebrew) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="日本語 (Japanese)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-ja_JP" data-locale="ja_JP" role="menuitem" lang="ja_JP"> 日本語 (Japanese) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="한국어 (Korean)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-ko_KR" data-locale="ko_KR" role="menuitem" lang="ko_KR"> 한국어 (Korean) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="मराठी (Marathi)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-mr_IN" data-locale="mr_IN" role="menuitem" lang="mr_IN"> मराठी (Marathi) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Bahasa Malaysia (Malay)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-ms_MY" data-locale="ms_MY" role="menuitem" lang="ms_MY"> Bahasa Malaysia (Malay) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Nederlands (Dutch)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-nl_NL" data-locale="nl_NL" role="menuitem" lang="nl_NL"> Nederlands (Dutch) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Norsk (Norwegian)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-no_NO" data-locale="no_NO" role="menuitem" lang="no_NO"> Norsk (Norwegian) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="ਪੰਜਾਬੀ (Punjabi)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-pa_IN" data-locale="pa_IN" role="menuitem" lang="pa_IN"> ਪੰਜਾਬੀ (Punjabi) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Polski (Polish)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-pl_PL" data-locale="pl_PL" role="menuitem" lang="pl_PL"> Polski (Polish) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Português (Portuguese)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-pt_BR" data-locale="pt_BR" role="menuitem" lang="pt_BR"> Português (Portuguese) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Română (Romanian)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-ro_RO" data-locale="ro_RO" role="menuitem" lang="ro_RO"> Română (Romanian) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Русский (Russian)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-ru_RU" data-locale="ru_RU" role="menuitem" lang="ru_RU"> Русский (Russian) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Svenska (Swedish)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-sv_SE" data-locale="sv_SE" role="menuitem" lang="sv_SE"> Svenska (Swedish) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="తెలుగు (Telugu)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-te_IN" data-locale="te_IN" role="menuitem" lang="te_IN"> తెలుగు (Telugu) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="ภาษาไทย (Thai)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-th_TH" data-locale="th_TH" role="menuitem" lang="th_TH"> ภาษาไทย (Thai) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Tagalog (Tagalog)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-tl_PH" data-locale="tl_PH" role="menuitem" lang="tl_PH"> Tagalog (Tagalog) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Türkçe (Turkish)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-tr_TR" data-locale="tr_TR" role="menuitem" lang="tr_TR"> Türkçe (Turkish) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Українська (Ukrainian)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-uk_UA" data-locale="uk_UA" role="menuitem" lang="uk_UA"> Українська (Ukrainian) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="Tiếng Việt (Vietnamese)" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-vi_VN" data-locale="vi_VN" role="menuitem" lang="vi_VN"> Tiếng Việt (Vietnamese) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="简体中文 (Chinese (Simplified))" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-zh_CN" data-locale="zh_CN" role="menuitem" lang="zh_CN"> 简体中文 (Chinese (Simplified)) </button> </li> <li class="language-selector__item" role="presentation"> <!-- Adding aria-label to both the li and the button because screen reader focus goes to button on desktop and li on mobile--> <button aria-label="正體中文 (Chinese (Traditional))" class="font-sans text-xs link block py-[5px] px-2 w-full hover:cursor-pointer hover:bg-color-action hover:text-color-text-on-dark focus:bg-color-action focus:text-color-text-on-dark language-selector__link !font-regular" data-tracking-control-name="language-selector-zh_TW" data-locale="zh_TW" role="menuitem" lang="zh_TW"> 正體中文 (Chinese (Traditional)) </button> </li> <!----> </ul> <button class="language-selector__button select-none relative pr-2 font-sans text-xs font-bold text-color-text-low-emphasis hover:text-color-link-hover hover:cursor-pointer focus:text-color-link-focus focus:outline-dotted focus:outline-1" aria-expanded="false" data-tracking-control-name="footer-lang-dropdown_trigger"> <span class="language-selector__label-text mr-0.5 break-words"> Language </span> <icon class="language-selector__label-chevron w-2 h-2 absolute top-0 right-0" data-delayed-url="https://static.licdn.com/aero-v1/sc/h/cyolgscd0imw2ldqppkrb84vo"></icon> </button> </div> </li> </ul> <!----> </footer> <script src="https://static.licdn.com/aero-v1/sc/h/7itt46rafycxiwozfd111d2we" async></script> <!----> <script src="https://static.licdn.com/aero-v1/sc/h/3iztwohxe2bmun1nouya4b56h" async defer></script> <script data-delayed-url="https://static.licdn.com/aero-v1/sc/h/zjknc3m26x2ha3j6ctgfqond" data-module-id="media-player"></script> <code id="trackingData" style="display: none"><!--{"hashedCourseId":"N+vjcBIIwopFvxvSuyLlJ7fr6he9mSuEQM7afoghF+c=","urn":"urn:li:lyndaCourse:3806088","totalPrice":{"currencyCode":"SGD","amount":"40.36"}}--></code> <code id="alcOnlyData" style="display: none"><!--{"isAlcOnly":false,"canPurchaseCourse":true}--></code> <!----> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10