From the course: SecOps on Google Distributed Cloud (GDC) for Tier 3 Analysts by Google

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Penetration testing

Penetration testing

- [Instructor] In this video, you'll look at penetration testing, the third of the three fundamental techniques that tier 3 analysts can use for effective vulnerability management. While vulnerability scanning identifies potential security weaknesses, penetration testing takes a step further by attempting to breach these vulnerabilities, which provides a practical evaluation of the organization's defense capabilities. Together, vulnerability scanning and penetration testing form a comprehensive approach to identifying and mitigating security risks. Let's take a closer look at penetration testing. With penetration testing, also known as pen testing, you play the role of a simulated attacker in order to actively evaluate your organization's security. Your main goals are to identify vulnerabilities and weaknesses within your systems, networks or applications, and then provide actionable insights and recommendations…

Contents