Pen Testing for Software Development: The Penetration Testing Process

IT Security    |    Intermediate
  • 16 Videos | 1h 33m 36s
  • Includes Assessment
  • Earns a Badge
Likes 16 Likes 16
Penetration testing can identify both known and unknown vulnerabilities and help avoid security breaches. In this course, you’ll learn the importance of penetration testing, what system hardening is, and the requirements of penetration testing. You’ll then examine the differences between penetration testing and vulnerability assessments, as well as the various types, stages, and methods of penetration testing. Next, you’ll learn about white box, black box, and gray box penetration testing, and the differences in penetration testing methodologies. You’ll see the available tools for performing penetration testing, as well as the types of outputs resulting from penetration testing. Lastly, you’ll learn about penetration testing best practices and how to perform a penetration test.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe what penetration testing is
    recognize the importance of penetration testing
    describe what system hardening is
    identify requirements of penetration testing
    differentiate between penetration testing and vulnerability assessments
    identify types of penetration testing
    identify the stages of penetration testing
  • list the different methods of penetration testing
    recognize the differences between white box, black box, and gray box penetration testing
    describe the differences in penetration testing methodologies
    identify the tools available for penetration testing
    recognize the types of outputs of penetration testing
    identify penetration testing best practices
    perform a penetration test
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 6s
    UP NEXT
  • Playable
    2. 
    Penetration Testing
    2m 24s
  • Locked
    3. 
    Importance of Penetration Testing
    4m 2s
  • Locked
    4. 
    System Hardening
    8m 7s
  • Locked
    5. 
    Penetration Testing Requirements
    5m 18s
  • Locked
    6. 
    Penetration Testing vs. Vulnerability Assessments
    6m 36s
  • Locked
    7. 
    Types of Penetration Testing
    6m 21s
  • Locked
    8. 
    Stages of Penetration Testing
    6m 49s
  • Locked
    9. 
    Methods of Penetration Testing
    4m 19s
  • Locked
    10. 
    White Box, Black Box, and Gray Box
    5m 50s
  • Locked
    11. 
    Penetration Testing Methodologies
    3m 18s
  • Locked
    12. 
    Tools for Penetration Testing
    7m 59s
  • Locked
    13. 
    Penetration Testing Output Types
    7m 10s
  • Locked
    14. 
    Penetration Testing Best Practices
    5m 23s
  • Locked
    15. 
    Performing a Penetration Test
    10m 48s
  • Locked
    16. 
    Course Summary
    1m 8s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 15 Likes 15