From the course: Complete Guide to Enterprise Cyber Defense

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Penetration testing for assurance

Penetration testing for assurance

- [Instructor] Over the last decade, testing computer systems for vulnerabilities has become a necessary part of any deployment. Traditionally, the software development lifecycle included testing as the final stage prior to going live and used testing methods based on developing test cases to confirm the software was functionally correct, ie, it produced the correct result. While this was all very well for software through to the 1990s, the advent of the internet and online services provided a rich environment for hackers to find flaws in software. Often, these flaws exploited and expected inputs such as maliciously crafted packets and used unexpected techniques such as command injection. The typical hacker was a bored teenager with a computer and a modem and plenty of spare time. These attacks demonstrated the limitations of testing by thinking like a developer and began the age of testing by thinking like an attacker.…

Contents