Académique Documents
Professionnel Documents
Culture Documents
EC Council
EC-Council
M d l XLV
Module
Post Testing Actions
Prioritize Recommendations
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Conduct Training
Conduct training for analyzing security posture of a
network.
t
k
Technical security training programs for people
managing information technology.
Training
a
g for
o app
application
cat o deve
developers
ope s to deve
develop
op secu
securee
code.
Security education and awareness programs need to be
implemented, such as:
General security awareness for new employees in the
organi ation
organization.
Awareness program through e-learning.
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Decide on required and available resources to maintain a consistent
level of information security.
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited