Phase 1 – Penetration Testing

Phase 2 – Internal Security Audit

Phase 3 – Post Assessment Phase

Phase 4 – Recommendations & Training

Recommendations and Training phase includes:

  • Prioritization of targets as well as by critical vulnerabilities.
  • Internal team tool evaluation and training.
  • Determination of best practices and the training to uphold them.
  • Development of a staff training plan.
  • Transfer knowledge of best practices and industry standards to the end user