Manage Learn to apply best practices and optimize your operations.

Guide to penetration testing

This series explores penetration testing, an ethical hacking technique, to help security professionals evaluate the effectiveness of information security measures within their organizations.

As organizations become more open, adequately protecting an organization's information assets becomes a business imperative. Managing computer and network security has become an increasingly difficult and challenging job. Recent advancements in computing and communications technology have made organizations re-think their overall information/risk management strategy. As a result, companies now feel the need for monitoring and assessing overall security on a more widely dispersed level.

This series explores penetration testing, an ethical hacking technique, to help security professionals evaluate the effectiveness of information security measures within their organizations.


CONTENTS

Part 1: Reasons to perform a penetration test
Part 2: Performing a penetration test
Part 3: Penetration testing strategies
Part 4: Types of testing
Part 5: Test methodology and standards


Puneet Mehta
Puneet Mehta, CISSP Security Architect, SDG Corporation
Puneet Mehta is a Security Architect, at SDG Corporation, an e-security consulting and an e-business software services and solutions firm headquartered in Connecticut.

Puneet is also a valuable member of the expert panel on SearchNetworking.com answering member questions about network security. He has also published several popular articles:

  • Trusting identity management
  • 10 steps to secure instant messaging
  • This was last published in April 2005

    Dig Deeper on Network Security Monitoring and Analysis

    Start the conversation

    Send me notifications when other members comment.

    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

    Please create a username to comment.

    -ADS BY GOOGLE

    SearchSDN

    SearchEnterpriseWAN

    SearchUnifiedCommunications

    SearchMobileComputing

    SearchDataCenter

    SearchITChannel

    Close