5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice     Adapting Pen Testing for Software Development

Penetration testing can identify both known and unknown vulnerabilities and help avoid security breaches. In this course, you’ll learn the importance of penetration testing, what system hardening is, and the requirements of penetration testing. You’ll then examine the differences between penetration testing and vulnerability assessments, as well as the various types, stages, and methods of penetration testing. Next, you’ll learn about white box, black box, and gray box penetration testing, and the differences in penetration testing methodologies. You’ll see the available tools for performing penetration testing, as well as the types of outputs resulting from penetration testing. Lastly, you’ll learn about penetration testing best practices and how to perform a penetration test.



Objectives

Pen Testing for Software Development: The Penetration Testing Process

  • discover the key concepts covered in this course
  • describe what penetration testing is
  • recognize the importance of penetration testing
  • describe what system hardening is
  • identify requirements of penetration testing
  • differentiate between penetration testing and vulnerability assessments
  • identify types of penetration testing
  • identify the stages of penetration testing
  • list the different methods of penetration testing
  • recognize the differences between white box, black box, and gray box penetration testing
  • describe the differences in penetration testing methodologies
  • identify the tools available for penetration testing
  • recognize the types of outputs of penetration testing
  • identify penetration testing best practices
  • perform a penetration test
  • summarize the key concepts covered in this course