please describe methods of a network security assessment why is a post mortem assessment review important what is the purpose of penetration testing

please describe methods of a network security assessment why is a post mortem assessment review important what is the purpose of penetration testing