What is Penetration
Testing and career path
What is a Penetration testing
• A pentest is a set of authorized cyber attacks, in order to
discover and verify the vulnerabilities of an information system.
• In a typical pentest session, vulnerabilities are carefully
exploited.
– Customer will be informed of all steps.
– Tests will be performed against all systems of the customer.
2
Penetration Tester
• The responsibilities of a Penetration Tester involve finding any
vulnerabilities or exploits with a given a target.
• These targets could be Networks, Web Applications, Desktop,
etc.
• The goal of finding vulnerabilities enables companies to create
plans to mitigate those vulnerabilities which in turn can prevent
a risk of an attack.
3
Penetration
Testers are also
called “ethical
hackers” as they
use their talents
in hacking to
secure
organizations.
Why to Perform a Pen-test
• Depicting the current security level of a company
• Identifying the gaps, and security consciousness of both systems
and human resources against possible breaches
• Pentests find out; How big and what sensitive information will be
lost in case of a cyber attack
• Different attack types and methods are discovered each day.
4
Benefits of Penetration testing
5
Vulnerabilities of
an information
system are
exposed
Facilitates the
analysis of genuine
risks
Helps sustain
Business
Continuity
Decreases the
possibility of real
attacks
Protects staff,
customers and
business partners
Career Path to becoming a Great
Pentester
Core: Certified Network Defender (C|ND), Certified Ethical
Hacker (C|EH), and Certified Ethical Hacker (C|EH) Practical.
Advanced: Certified Security Analyst (ECSA) and Certified
Security Analyst (ECSA) Practical.
Expert: Licensed Penetration Tester (L|PT) Master exam.
6
Skills for Penetration testing
Skills we generally would see in these positions include:
7
•An up-to-date knowledge of IT Security related hardware, software and
vendor solutions
•Up to date knowledge of the tools and techniques that cyber criminals
and hackers are likely to employ
•Understanding of relevant scripting and source code programming
languages, such as C#, C++, .NET, Java, Perl, PHP, Python or Ruby On Rails
etc. that you will be using
•An analytical mind with the ability to respond quickly to findings
•Good written and verbal communication skills
Qualifications Required
What qualifications do I need?
•Employees may desire a Bachelors degree in a related field such as
Computer Science, IT or a Cyber-Security related field, but this is not a
necessity
•Experience of hacking learnt on the street may be the best
qualification for this role!
8
Job Roles
• Penetration tester
• Application Security Analyst
• Security Consultant
• VAPT Analyst
• Cyber Security-Vulnerability Assessment & Penetration
Testing(VAPT)
• Security Penetration Testing Security Architect
9
10
Thank you for Watching!
Are you interested in learning pentesting? Get industry ready with
penetration testing professional certification

What is penetration testing and career path

  • 1.
  • 2.
    What is aPenetration testing • A pentest is a set of authorized cyber attacks, in order to discover and verify the vulnerabilities of an information system. • In a typical pentest session, vulnerabilities are carefully exploited. – Customer will be informed of all steps. – Tests will be performed against all systems of the customer. 2
  • 3.
    Penetration Tester • Theresponsibilities of a Penetration Tester involve finding any vulnerabilities or exploits with a given a target. • These targets could be Networks, Web Applications, Desktop, etc. • The goal of finding vulnerabilities enables companies to create plans to mitigate those vulnerabilities which in turn can prevent a risk of an attack. 3 Penetration Testers are also called “ethical hackers” as they use their talents in hacking to secure organizations.
  • 4.
    Why to Performa Pen-test • Depicting the current security level of a company • Identifying the gaps, and security consciousness of both systems and human resources against possible breaches • Pentests find out; How big and what sensitive information will be lost in case of a cyber attack • Different attack types and methods are discovered each day. 4
  • 5.
    Benefits of Penetrationtesting 5 Vulnerabilities of an information system are exposed Facilitates the analysis of genuine risks Helps sustain Business Continuity Decreases the possibility of real attacks Protects staff, customers and business partners
  • 6.
    Career Path tobecoming a Great Pentester Core: Certified Network Defender (C|ND), Certified Ethical Hacker (C|EH), and Certified Ethical Hacker (C|EH) Practical. Advanced: Certified Security Analyst (ECSA) and Certified Security Analyst (ECSA) Practical. Expert: Licensed Penetration Tester (L|PT) Master exam. 6
  • 7.
    Skills for Penetrationtesting Skills we generally would see in these positions include: 7 •An up-to-date knowledge of IT Security related hardware, software and vendor solutions •Up to date knowledge of the tools and techniques that cyber criminals and hackers are likely to employ •Understanding of relevant scripting and source code programming languages, such as C#, C++, .NET, Java, Perl, PHP, Python or Ruby On Rails etc. that you will be using •An analytical mind with the ability to respond quickly to findings •Good written and verbal communication skills
  • 8.
    Qualifications Required What qualificationsdo I need? •Employees may desire a Bachelors degree in a related field such as Computer Science, IT or a Cyber-Security related field, but this is not a necessity •Experience of hacking learnt on the street may be the best qualification for this role! 8
  • 9.
    Job Roles • Penetrationtester • Application Security Analyst • Security Consultant • VAPT Analyst • Cyber Security-Vulnerability Assessment & Penetration Testing(VAPT) • Security Penetration Testing Security Architect 9
  • 10.
    10 Thank you forWatching! Are you interested in learning pentesting? Get industry ready with penetration testing professional certification