Skip main navigation

Design a pen test

Your task Using one or more of the methodologies discussed earlier, design a penetration testing project of the target network and systems, by planning all steps in the project. Use …

Information security

What does it actually mean to be ‘secure’? Most people would think that security means protecting against unauthorised access but there’s actually a lot more to it. Often when we …

Setting up your network

Earlier this week, you should have downloaded the virtual machines (VMs) required for the following practical exercise. Please refer back to the step ‘setting up a virtual lab’ if you …

Challenges of the future

Digital systems are being introduced in almost every part of our lives. In our homes, our businesses, national infrastructures and so on. Every new environment provides its own security challenges …

NIST SP800-115

The Technical Guide to Information Security Testing and Assessment (also known by the catchy title NIST SP800-115) was published by the National Institute of Standard and Technology (NIST) in 2008. …

OWASP Penetration Testing Methodology

The OWASP Testing Guide is being developed as part of the OWASP Testing Project of the Open Web Application Security Project (OWASP). It is not a complete methodology covering a …

Penetration Testing Execution Standard (PTES)

The Penetration Testing Execution Standard (PTES) is the most recent (and arguably the most complete overall) penetration testing methodology we will discuss. It was developed by a team of information …

An introduction to the methodologies

Penetration testing is no longer a single hacker’s ad hoc job. In almost all cases it is a formal process that needs to address the business and security needs of …

Linux skills builder

A lot of the work of an ethical hacker is done using Linux. In order to be successful in this field, your Linux knowledge and skills should be at a …

Ethical Hacking: Penetration Testing

Penetration testing is part of the risk management of an organisation. It’s part of the processes for protecting the organisation’s high-value assets, as well as compliance with data protection legislation. …

GDPR

The General Data Protection Regulation (GDPR) is a law implemented across all countries in the European Union (EU). It governs the collection, storage and processing of personal data and protects …

Other relevant legislation

There are several more laws which can affect the work of the ethical hacker. Communications Act 2003 The Communications Act has two sections which are directly relevant to penetration testing: …

Why are we all here?

Our lives are heading deeper and deeper into cyberspace. Digital systems now process and store more of our personal data than ever before and are central to areas of critical …
close
  • 30% off Unlimited – Back by Popular Demand Nov-Dec 2021