Index
A, B
Acquiring talent
Adversary as a Service (AaaS)
Amazon Web Services (AWS)
Application assessments
authenticated/unauthenticated
definition
high/lower privileged accounts
impressive report
source code
stealth testing
WAF validation
Artificial intelligence (AI) systems
abuse optimizations
data poisoning
leaking
safety constraints
C
Client management
approaches
assessments
chat channel
Domain Admin access
engagement time
handoff meeting
high-quality assessment
industry comparisons
internal red/pentest teams
kickoff meeting
motivations/concerns
experiences
industry security certification
policies
security concerns
motivations/definitions
outbrief flow
project execution
engagements
operational checklists
penetration testing
post-engagement
pre-engagement processes
reporting/pentesting ...

Get The Business of Hacking: Creating, Developing, and Maintaining an Effective Penetration Testing Team now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.