The National Institute of Standards and Technology (NIST), an agency of the U.S. Department of Commerce, provides several insightful definitions of ‘penetration testing’. Hence, we define penetration testing according to the Technical Guide to Information Security Testing and Assessment (NIST SP 800-115). It describes penetration testing as an ‘authorised test where ethical hackers mimic real-life attacks to bypass and infiltrate the security features of an application, system, network and other would-be entry points’.
This free online course highlights the benefits of penetration testing, including how it can help improve business continuity, justify security investments and satisfy the prerequisites for cybersecurity insurance. Study the three types of penetration testing, the exploit and vulnerability lifecycle, zero-day hacks and pen testing methodologies, including the Information Systems Security Assessment Framework (ISSAF). Moreover, we will explore the tools for hacking information, how to detect live systems and some foolproof ‘social engineering’ techniques.
Finally, you will learn about banner grabbing and enumeration techniques and the process and benefits of the vulnerability assessment (VA). We will present real-world demonstrations of ethical and unethical methods for hacking an operating system. You will learn about exploit development, sniffing and evasion techniques and assessing and hacking web technologies. Depending on the objectives of an organisation, you will see how to present the outcome of a pen test to the appropriate authorities to help them make strategic cybersecurity improvements and prioritise related remediation efforts. By taking the online course, you will learn how to intelligently manage risk, protect the corporate image and prevent clients and partners from potential financial damage. Start learning now.
What You Will Learn In This Free Course
- Recognise the methodologies and ben...
- Recall the hacking techniques and t...
- Describe banner grabbing, enumerati...
- Discuss ethical methods for hacking...
- Recognise the methodologies and benefits of penetration testing
- Recall the hacking techniques and tools for detecting live systems
- Describe banner grabbing, enumeration hacking techniques and their countermeasures
- Discuss ethical methods for hacking operating systems
- Explain hacking with PowerShell, sniffing and hacking web technologies
- Relate the tools and procedures for hacking mobile and Internet of Things (IoT) devices
- Summarise how to write a standard penetration testing report
View All Learning Outcomes View Less All Alison courses are free to enrol study and complete. To successfully complete this certificate course and become an Alison Graduate, you need to achieve 80% or higher in each course assessment. Once you have completed this certificate course, you have the option to acquire an official certificate, which is a great way to share your achievement with the world.
Your Alison certificate is:
- Ideal for sharing with potential employers
- Great for your CV, professional social media profiles and job applications.
- An indication of your commitment to continuously learn, upskill & achieve high results.
- An incentive for you to continue empowering yourself through lifelong learning.
Alison offers 3 types of certificates for completed certificate courses:
- Digital certificate: a downloadable certificate in PDF format immediately available to you when you complete your purchase.
- certificate: a physical version of your officially branded and security-marked certificate
All certificates are available to purchase through the Alison Shop. For more information on purchasing Alison certificate, please visit our FAQs. If you decide not to purchase your Alison certificate, you can still demonstrate your achievement by sharing your Learner Record or Learner Achievement Verification, both of which are accessible from your Account Settings.