In this chapter, you will learn about security assessments, penetration testing, risk management, and various testing tools.
- 1.
Identify security assessments.
- 2.
Identify the steps of penetration testing.
- 3.
Examine risk management.
- 4.
Identify various penetration testing tools.
Penetration Testing Overview
A penetration test , also known as a pen test, is used to simulate methods that an attacker would use to gain unauthorized access to a network and compromise ...