Penetration Testing: The Big Picture
By Keith Watson
Course info
Course info
Description
As more businesses create, collect, and manage large volumes of customer data and provide access to that data through mobile apps, the Web, and IoT devices, there are more opportunities for that data to be compromised and stolen by nefarious individuals, criminal groups, and even governments. Organizations are struggling to improve the accessibility to and increase the value of their intellectual property while simultaneously protecting it from unauthorized exposure. As news in the past few years has shown, this is a significant challenge and many organizations lost control over their customer's data and their own intellectual property. Penetration testing is one technique that organizations use to find and correct weaknesses in their network and systems before someone else does. First, you will learn how penetration testing serves as key component in an organization's information security management program. Next, you will learn about the penetration testing process and techniques used to discover and exploit vulnerabilities. Finally, you will have a good understanding of the software tools, certifications, and other courses that can help you build your technical skills. When you finish this course, you will have the knowledge of how penetration testing is used to improve the security of a network and the techniques and tools used to conduct the testing.
Section Introduction Transcripts
Course Overview
Hi everyone, my name is Keith Watson, and welcome to my course: Penetration Testing: The Big Picture. I'm an information security professional at Optiv Security, with more than 20 years' experience in information security. Interest in penetration testing has grown in recent years, primarily due to the need for organizations to validate their security practices to their customers, boards of directors, shareholders, and the general public. Penetration testing also has a certain mystique to it. In this course, we're going to look at penetration testing at a high level, from scoping projects and interacting with clients, to the various types of tests and the phases of a penetration testing engagement. Some of the major topics that we will cover include: an introduction to information security, a detailed discussion on the various types of penetration test, the penetration testing execution standard, and penetration testing tools and certifications. By the end of this course, you'll know the basics of penetration testing, and should be ready to dive into other technical penetration testing courses. I hope you'll join me on this journey to learn penetration testing with Penetration Testing: The Big Picture, here, at Pluralsight.