The document describes various security assessments that can be performed including application security assessment, network security assessment, host security assessment, penetration testing, database security assessment, and web application security assessment. Each assessment identifies vulnerabilities and weaknesses. Technical and executive reports are provided with detailed vulnerabilities and remediation solutions as well as high-level findings.