Penetration testing or ethical hacking is a proactive security assessment that tests internal and external systems by simulating attacks, with the goal of reducing overall risks.
- [Instructor] Network specialists actively keep up…with patch and configuration management,…constantly monitor system defenses…and ensure that they have securely configured…operating systems and all applications.…Managers train their employees not to fall victim…to social engineering attacks…and reputation-based endpoint protection…monitors our system so we don't click on a wrong link.…However, no matter how diligent any of us are,…an attacker may be able to breach the network's defenses…and steal data.…
If you're in charge of protecting the digital assets,…the only way you'll know how your system…will perform under an attack…is by simulating attacks under controlled circumstances…instead of waiting for a real breach to occur…and face the consequences.…Penetration testing or ethical hacking…is a proactive security assessment…that tests internal and external systems…by simulating attacks.…During testing, security specialists review policies…and procedures of an information system…with the goal of reducing overall risks.…
Released
11/17/2016- Auditing security mechanisms
- Locating vulnerabilities
- Exploring types of penetration testing
- Pen testing techniques
- Following a pen-testing blueprint
- Testing physical, wireless, website, database, and email security
- Outsourcing penetration testing
Share this video
Embed this video
Video: Understanding penetration testing