2.5 Module 2 Summary and Quiz
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
7 hours 17 minutes
module summary. So we did a lot of things in this module. A few things we went over. When you actually receive the job, the rules of engagement, what those are We went over the initial information gathering phase and, ah, few ways that you can do that. We also went over determining
the different types of risks that evening encounter, including legal risks,
contract Shewell risks, operational risks and environmental risks. We've been over the basics of building a plan and gathering the equipment needed to execute that plan. We also went over the communication and documentation that you need to have in order to have a successful test. The last thing we've been over
is actually assembling your operations team
and the team members involved and their roles. Ah, few. Those numbers aren't the leader
the coordinator, the ethical hacker,
the physical security expert,
surveillance expert in the social engineer
Up next, we're going to go over the different types of information gathering methods available to you and your team in detail. But first we're going to end with a quick quiz.
So the first question we've got is what type of risk can put the operation at stake.
Is that a contractual risk,
and operational risks
or an environmental risk?
You're just a second to think about that.
Yeah, and that's seats and operational risk.
If it's something that could put the actual operation at risk,
it's an operational risk.
So Michael Scarran is putting together a team for Operation Threat Level. Midnight.
This up will require someone skilled in manipulation and deception.
Who should he pick for? The team
is a golden thinks the physical security expert.
Is it Catherine Zeta Scar, the social engineer
about Cherokee Jack Leader?
Or is it Bridget, the ethical hacker?
And that was be Catherine Zeta scar on the social engineer. So again, that's all for this module coming up. Next, we've got our information gathering methods where we go into that information in detail.