Pen testing lifecycle

Now that we have a good understanding of vulnerability causes from the earlier section, let's look at the five stages of pen tests in this section:

The preceding diagram depicts the life cycle of pen tests, involving five phases of activities such as Preparation, Scanning, Gaining Access and Maintaining Access, and reporting.

Let's look at each phase in more detail in the following sections.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.137.171.121