2.5 Module 2 Summary and Quiz
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:02
module summary. So we did a lot of things in this module. A few things we went over. When you actually receive the job, the rules of engagement, what those are We went over the initial information gathering phase and, ah, few ways that you can do that. We also went over determining
00:20
the different types of risks that evening encounter, including legal risks,
00:24
contract Shewell risks, operational risks and environmental risks. We've been over the basics of building a plan and gathering the equipment needed to execute that plan. We also went over the communication and documentation that you need to have in order to have a successful test. The last thing we've been over
00:43
is actually assembling your operations team
00:46
and the team members involved and their roles. Ah, few. Those numbers aren't the leader
00:52
the coordinator, the ethical hacker,
00:55
the physical security expert,
00:57
surveillance expert in the social engineer
01:06
Up next, we're going to go over the different types of information gathering methods available to you and your team in detail. But first we're going to end with a quick quiz.
01:18
So the first question we've got is what type of risk can put the operation at stake.
01:23
Is that a contractual risk,
01:26
legal risk
01:26
and operational risks
01:29
or an environmental risk?
01:33
You're just a second to think about that.
01:37
Yeah, and that's seats and operational risk.
01:41
If it's something that could put the actual operation at risk,
01:44
it's an operational risk.
01:47
So Michael Scarran is putting together a team for Operation Threat Level. Midnight.
01:52
This up will require someone skilled in manipulation and deception.
01:57
Who should he pick for? The team
01:59
is a golden thinks the physical security expert.
02:02
Is it Catherine Zeta Scar, the social engineer
02:07
about Cherokee Jack Leader?
02:10
Or is it Bridget, the ethical hacker?
02:17
And that was be Catherine Zeta scar on the social engineer. So again, that's all for this module coming up. Next, we've got our information gathering methods where we go into that information in detail.
Up Next
Similar Content