Guide to penetration testing

As organizations become more open, adequately protecting an organization's information assets becomes a business imperative. Managing computer and network security has become an increasingly difficult and challenging job. Recent advancements in computing and communications technology have made organizations re-think their overall information/risk management strategy. As a result, companies now feel the need for monitoring and assessing overall security on a more widely dispersed level.

This series explores penetration testing, an ethical hacking technique, to help security professionals evaluate the effectiveness of information security measures within their organizations.

    Requires Free Membership to View


CONTENTS

Part 1: Reasons to perform a penetration test
Part 2: Performing a penetration test
Part 3: Penetration testing strategies
Part 4: Types of testing
Part 5: Test methodology and standards


Puneet Mehta
Puneet Mehta, CISSP Security Architect, SDG Corporation
Puneet Mehta is a Security Architect, at SDG Corporation, an e-security consulting and an e-business software services and solutions firm headquartered in Connecticut.

Puneet is also a valuable member of the expert panel on SearchNetworking.com answering member questions about network security. He has also published several popular articles:

  • Trusting identity management
  • 10 steps to secure instant messaging

    This was first published in April 2005

  • Join the conversationComment

    Share
    Comments

      Results

      Contribute to the conversation

      All fields are required. Comments will appear at the bottom of the article.