课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Penetration testing

Penetration testing

- [Instructor] Vulnerability testing merely probes systems for vulnerabilities. These tests can be active, reaching out and interacting with systems, but they're rarely dangerous because they don't typically complete an attack. That said, actually executing an attack is the best way to understand a system's vulnerabilities. Penetration tests do this by placing security professionals in the role of attackers. During a penetration test, attackers normally begin by gathering information about systems and then using that information to engage in actual attacks. The test is considered successful if the attackers manage to penetrate the target system. The goal is to test security controls by attempting to bypass or defeat them. Before beginning a penetration test, it's important to meet with the sponsor of the test and clarify the permitted scope of the testing. You need to know what systems you are allowed to target and the techniques that you are permitted to use. To protect everyone from…

内容