From the course: Performing a Technical Security Audit and Assessment

Unlock the full course today

Join today to access over 24,800 courses taught by industry experts.

Conduct penetration tests

Conduct penetration tests

- [Instructor] Throughout this course, I've frequently mentioned penetration testing. Let's learn what it is and how it's used. Penetration testing involves validating vulnerabilities by attempting to exploit them and gain unauthorized access. Also known as pen tests or ethical hacking, these assessments build upon the information gathered during the discovery and vulnerability scanning phases. Penetration tests are crucial to security assessments because they validate existing weaknesses by simulating real-world attack scenarios. Typically, pen tests follow a four-stage methodology, gather data and planning, discovery and vulnerability analysis, attempt exploits, and reporting and remediation. The gather data and planning stage closely parallels the content covered in this course's "Technical Security Assessment Reviews" and "Planning Technical Security Assessments" chapters. in this stage, assessors determine the assessment scope, obtain proper permissions, and coordinate assessment…

Contents