From the course: Complete Guide to Enterprise Cyber Defense
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Penetration testing for assurance
From the course: Complete Guide to Enterprise Cyber Defense
Penetration testing for assurance
- [Instructor] Over the last decade, testing computer systems for vulnerabilities has become a necessary part of any deployment. Traditionally, the software development lifecycle included testing as the final stage prior to going live and used testing methods based on developing test cases to confirm the software was functionally correct, ie, it produced the correct result. While this was all very well for software through to the 1990s, the advent of the internet and online services provided a rich environment for hackers to find flaws in software. Often, these flaws exploited and expected inputs such as maliciously crafted packets and used unexpected techniques such as command injection. The typical hacker was a bored teenager with a computer and a modem and plenty of spare time. These attacks demonstrated the limitations of testing by thinking like a developer and began the age of testing by thinking like an attacker.…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.