This course will provide a brief overview of how a security pen test is used to discover systems which may be compromised by an unauthorized hacker.
The purpose of IT security is to protect IT assets of an organization as well as to protect employee and customer privacy. In this course, IT Security Champion: Pen Tests, you’ll learn about how pen tests are used in an organization and why they are important. First, you’ll explore the different types of pen tests and how they are applied. Next, you’ll discover what an IT analyst’s role is in pen testing. Finally, you’ll learn the types of technical vulnerabilities a pen tester is seeking to find and exploit. When you’re finished with this course, you’ll understand what a pen test seeks to accomplish as well as the role of an IT analyst in the pen testing process.
The purpose of IT security is to protect IT assets of an organization as well as to protect employee and customer privacy. In this course, IT Security Champion: Pen Tests, you’ll learn about how pen tests are used in an organization and why they are important. First, you’ll explore the different types of pen tests and how they are applied. Next, you’ll discover what an IT analyst’s role is in pen testing. Finally, you’ll learn the types of technical vulnerabilities a pen tester is seeking to find and exploit. When you’re finished with this course, you’ll understand what a pen test seeks to accomplish as well as the role of an IT analyst in the pen testing process.