Open-Source Security Testing Methodology Manual (OSSTMM 2.2)

Posted in Internet Security Whitepapers, Penetration Testing

0.0/5 rating (0 votes)

This manual is a combination of ambition, study, and years of experience. The individual tests themselves are not particularly revolutionary, but the methodology as a whole does represent the benchmark for the security testing profession. And through the thoroughness of its application you will find a revolutionary approach to testing security. The objective of this manual is to create one accepted method for performing a thorough security test. Details such as the credentials of the security tester, the size of the security firm, financing, or vendor backing will impact the scale and complexity of our test – but any network or security expert who meets the outline requirements in this manual will have completed a successful security profile. You will find no recommendation to follow the methodology like a flowchart. It is a series of steps that must be visited and revisited (often) during the making of a thorough test.
∙:∙ If you have trouble viewing this document, please click the link below!
Open-Source Security Testing Methodology Manual (OSSTMM 2.2)

Comments (0)

Leave a comment

Please login to leave a comment. Optional login below.