Skip to main content

 Cybersecurity - Vulnerability Testing and Assessment

​​​​​​No country, industry, community or individual is immune to cyber risks. Cyber space is woven into the very fabric of our daily lives and we must have the right protection to avoid exploits.

With hundreds of systems and applications across your networked environment connected to the Internet, updating and maintaining system operating systems and software applications is essential.

Testing Methodology

We can identify control and process weaknesses that can be exploited by a malicious insider or a cyber attacker using a multi-phased approach. 

Testing includes:

  • ​Network vulnerability testing
  • Conformance with organizational policies
  • Process validation
  • Configuration review
  • Analysis of system-generated information, including:
    • ​Windows, Linux, and UNIX operating systems
    • MS SQL, Oracle, and MySQL databases​​
  • And more...​​

Contact Information

Scott Terry

Program Director

Connect with us

© Copyright 2015 Texas A&M Engineering Extension Service
A member of the Texas A&M University System
Ver.1.2015.0204