In this chapter, we’ll talk about penetration testing and what it is (and isn’t!), how it differs from an actual “hacker attack,” some of the ways penetration tests are conducted, how they’re controlled, and what organizations might look for when they’re choosing a company to conduct a penetration test for them. Because this is a chapter and not an entire book, there are a lot of things that I just don’t have the space to talk about. What you’re about to read is, quite literally, just the tip of the iceberg when it comes to penetration testing. Keep that in mind when you think to yourself: “What about …?” The answer to your question (whatever it might be) is probably a part of our licensed penetration tester certification course!
Este sitio es seguro
Usted está en un sitio seguro, habilitado para SSL. Todas nuestras fuentes son constantemente verificadas.