Phase 1 – Penetration Testing
Phase 2 – Internal Security Audit
Phase 3 – Post Assessment Phase
Phase 4 – Recommendations & Training
The Post Assessment Phase is conducted on‐site and off‐site over a period of weeks (depending on the network size and requirements) from the conclusion of Vulnerability Analysis (On‐site) Phase and includes:
- Complete final assessment report.
- Program enhancement recommendations.
- Priority items requiring immediate attention identified with recommendations