(bright music) … - [Instructor] Okay, let's take a look at the differences … between a scan and penetration testing. … Now, first we'll look at the purpose. … Now, with a vulnerability scan, … we're simply identifying vulnerabilities. … It will list the results, generally, in order of severity. … With penetration testing, … we're going to attempt to exploit the vulnerabilities. … Now when do we do this? … Well, with scanning, … we should do this approximately every quarter … or after a significant change, … such as a major software upgrade … or even a new installation of a system. … Penetration testing is generally done about once a year … or after a significant change, … again, after a new software implementation. … How is this done? … Well, with the vulnerability scan, … it's generally an automated process, … and then, you go back through and do a manual verification. … Penetration testing is a manual process, … but also uses different tools and techniques, … and then, this results in a comprehensive final report. …
- Auditing security mechanisms
- Locating vulnerabilities
- Exploring types of penetration testing
- Pen testing techniques
- Following a pen-testing blueprint
- Testing physical, wireless, website, database, and email security
- Outsourcing penetration testing
Skill Level Intermediate
1. Organizational Penetration Testing
2. Types of Penetration Testing
Testing using other methods2m 41s
3. Pen Testing Techniques
4. Pen Testing Blueprint
5. Outsourcing Penetration Testing
What's next1m 27s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.