Perform an independent security assessment/penetration test in order to:
These elements will be performed from a black box perspective. In the case of the network infrastructure, testing will be conducted over the internet and emulate the position of an external attacker with no prior knowledge of the network. For the phishing test, OSINT techniques will be used to identify suitable emails for the campaign. network security penetration testing information security
Copyright © 2018 Advanced Computer Systems (Midlands) Limited -
All Rights Reserved.