From the course: Performing a Technical Security Audit and Assessment

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Conduct penetration tests

Conduct penetration tests

From the course: Performing a Technical Security Audit and Assessment

Start my 1-month free trial

Conduct penetration tests

- I've been referring to penetration testing quite a bit throughout the course. Let's get down to what it is and how we can use it. Penetration testing validates target vulnerabilities by attempting to exploit those vulnerabilities and gain unauthorized access. Penetration tests, which are sometimes called Pen Tests, or ethical hacking, build on the information gathered during the discovery and vulnerability scanning stages. Pen tests are an important part of the security assessment, because they are the ultimate demonstration of existing security weaknesses. They simulate how an actual attacker would identify and possibly exploit vulnerabilities. Pen Tests typically follow a four-stage methodology. Gather data/planning, Discovery/vulnerability analysis, Attempt exploits, and Reporting/remediation. The Gather Data and Planning stage aligns closely with the technical security assessment reviews, and planning technical security assessments chapters in this course. This is where an…

Contents