September 2019
Intermediate to advanced
150 pages
6h 1m
English
Figure 3.1 Legal and regulatory requirements overview
Figure 6.1 Network components, data flow and user connection in an example organisation
Figure 6.2 Mapping the technical environment to understand the network infrastructure
Figure 8.2 Typical workflow of penetration testing and remediation
Table 7.1 Security capability related to size of organisation
Table 8.1 Comparison of penetration testing approaches