© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2021
A. SheikhCertified Ethical Hacker (CEH) Preparation Guidehttps://doi.org/10.1007/978-1-4842-7258-9_16

16. Penetration Testing

Ahmed Sheikh1  
(1)
Miami, FL, USA
 

In this chapter, you will learn about security assessments, penetration testing, risk management, and various testing tools.

By the end of this chapter, you will be able to
  1. 1.

    Identify security assessments.

     
  2. 2.

    Identify the steps of penetration testing.

     
  3. 3.

    Examine risk management.

     
  4. 4.

    Identify various penetration testing tools.

     

Penetration Testing Overview

A penetration test , also known as a pen test, is used to simulate methods that an attacker would use to gain unauthorized access to a network and compromise ...

Get Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.