O'Reilly logo

Information Technology Security Fundamentals by Bryan Hosack, Glen Sagers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 7

Danger! Danger! Danger! (Penetration Testing)

How do you stop attackers from getting into your network? Of course, there are many ways to protect your assets; we have already discussed a number of them. But, the security provided by a firewall, WiFi encryption, or any other protection, including passwords, is only as good as the implementation. Given the complexities of setting up security solutions properly, penetration testing is required. Penetration testing, also called pentesting in the security world, involves using the same tools an attacker would use to get into the network illicitly to find the holes in a system.

Professional penetration testers, sometimes called white-hat hackers, are professionals who try to breach defenses ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required