Information security tools and testing

You may need to do a quick third-party registration to access certain ones.

  • Going Beyond the IT Audit Veil with Ethical Hacking
  • Vulnerability Testing Blunders, Oversights, and Common Mistakes You Must Avoid – This webcast outlines common security testing problems that not only create business liabilities but also waste your valuable time and money.
  • What Not to Do When Testing Your Information Security – A lot of people can tell you how to test for information security weaknesses, but most aren’t willing to share where they’ve screwed up detailing what not to do. In this webcast, hear some tales from the trenches including common security testing oversights, issues that create serious liabilities, and common assumptions that can downright waste your valuable time and money when performing information security tests. Not only will you learn proper ways to plan your security testing strategy, you’ll benefit from the mistakes of others to better spend your resources in order to find the most vulnerabilities and help justify future information security spending.
  • The network analyzer: A security tool you can’t do without – This webcast outlines the benefits of using a network analyzer as an information security tool. See why no network administrator or security specialist should be without one!

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)


I’ve written/co-written 12 books on information security including: