- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Lee Allen Kevin Cardwell
- 114字
- 2021-07-09 20:20:35
Chapter 1. Penetration Testing Essentials
In this chapter, we will discuss why an essential element of penetration testing is planning, and a key component of this is having a methodology that emulates and matches the threat that we are portraying. We will discuss the following:
- The need for a methodology approach
- Examples of different methodologies available
- How to establish the testing methodology
If you have been performing penetration testing for some time and are very familiar with the methodology and concept of professional security testing, you can skip this chapter, or just skim it; however, you may learn something new or at least a different approach to how you approach penetration testing.
推薦閱讀
- CTF實戰(zhàn):技術、解題與進階
- 數(shù)字身份與元宇宙信任治理
- Kali Linux CTF Blueprints
- Kali Linux Network Scanning Cookbook(Second Edition)
- 網(wǎng)絡安全技術與實訓(第4版)(微課版)
- 計算機網(wǎng)絡安全基礎(第5版)
- CTF那些事兒
- 網(wǎng)絡安全實戰(zhàn)詳解(企業(yè)專供版)
- 交換機·路由器·防火墻(第2版)
- 安全網(wǎng)絡構(gòu)建
- 黑客攻防從入門到精通:實戰(zhàn)篇(第2版)
- Blockchain Development with Hyperledger
- INSTANT Microsoft Forefront UAG Mobile Configuration Starter
- Metasploit Bootcamp
- 大數(shù)據(jù)時代的智慧城市與信息安全