From the course: Introduction to Pen Testing for Cybersecurity Professionals
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Looking inside the organization
From the course: Introduction to Pen Testing for Cybersecurity Professionals
Looking inside the organization
- [Instructor] Pen testing monitors for threats in an organization. When testing, the team has choices in that they can use unknown environment testing, which sees what a hacker on the outside can see or they can use known environment testing, which takes a good look inside the internal structure and design of an organization's software. A known environment test looks inside the organization and is a first step in identifying internal threats. With this type of testing, there isn't a need to try to attack the system. It starts with the ethical hacker armed with full knowledge of the inner workings of the system, along with key credentials. When testing, the team can use a couple of different approaches. One approach is to have the same view as a malicious insider. By providing the team with the same access as an internal user, they can attempt to access resources that should not be accessible to them to see if a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
Comparing different environments4m 17s
-
(Locked)
Checking from the outside in3m 34s
-
(Locked)
Looking inside the organization3m 26s
-
(Locked)
Determining testing methods3m 32s
-
(Locked)
Discovering pen testing tools7m 16s
-
(Locked)
Challenge: Explain the NIST framework's five core functions1m 40s
-
(Locked)
Solution: Explain the NIST framework's five core functions3m 49s
-
(Locked)
-
-
-
-