O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Who should be doing penetration testing?

This is a challenging question; one important thing to realize here is that anyone who has knowledge of security, is kept updated with the day-to-day vulnerabilities, has performed pen testing activities in the past, is well versed in vulnerabilities and, moreover, is a person with experience and good certifications is preferred for such activities.

There are two things that one can do while considering this: either one can start an in-house security division that will perform penetration activities regularly and also monitor any active threat and identify and mitigate them in real time, or hire an external party to perform the penetration testing activity once, annually or quarterly. Invariably, the best ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required