Pen Testing Awareness: Results Management
IT Security
| Beginner
- 14 Videos | 1h 27m 15s
- Includes Assessment
- Earns a Badge
This 14-video course explores benefits to an organization and the role of penetration testing to protect digital assets and networks. In this course, learners observe how to manage and analyze testing results. You will examine several testing methods, including black box, white box, and grey box testing. Next, you will learn about rules of engagement documents, which is executed prior to starting the penetrations testing. This document outlines rules around the test, and the importance of setting stopping points within a penetration test, and when to stop a penetration test. Explore test findings management, risk, risk tolerance, and how to align recommendations to an organization's needs and goals. You will learn about risk tolerance from a privacy and intellectual property perspective, and how to create good test reports for clients. You will learn to categorize your findings by using CVE (Common Vulnerabilities and Exposure) database, or the CVE details. Finally, you will learn how to communicate needed changes, and to emphasize the importance of further testing after recommendations are implemented.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe how to set expectations and why it is importantdescribe black box penetration testing and why it may be useddescribe white box penetration testing and why it may be useddescribe grey box penetration testing and why it may be useddescribe the rules of engagement and how they are useddescribe the importance of setting stopping points and when to stop a penetration test
-
describe what should be documented during a penetration test and why it is importantdescribe the different categories of findingsdescribe organizational risk tolerance and why it is importantdescribe the importance of aligning recommendations to corporate culture, policies, and proceduresdescribe how to communicate changes to lay persons and executivesdescribe the importance of working with management to conduct further testing after recommendations are implementedsummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 27sUP NEXT
-
2.Setting Expectations6m 22s
-
3.Black Box Penetration Testing6m 41s
-
4.White Box Penetration Testing8m 26s
-
5.Grey Box Penetration Testing5m 26s
-
6.Rules of Engagement9m 11s
-
7.Stopping an Exercise7m 13s
-
8.Documenting Findings6m 24s
-
9.Categorizing Findings6m 42s
-
10.Risk and Risk Tolerance5m 57s
-
11.Making Recommendations8m 28s
-
12.Communicating Changes6m 57s
-
13.Scheduling Further Tests7m 11s
-
14.Course Summary51s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.