Artwork

内容由Joy Alatta提供。所有播客内容(包括剧集、图形和播客描述)均由 Joy Alatta 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Player FM -播客应用
使用Player FM应用程序离线!

Planning for Penetration Testing

13:37
 
分享
 

Manage episode 292613663 series 2926569
内容由Joy Alatta提供。所有播客内容(包括剧集、图形和播客描述)均由 Joy Alatta 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

The decision to conduct penetration testing is an indication of the importance of risk management in any organization. It is a good professional practice to document security policies that outlines how penetration testing should be conducted and how it relates to different types of systems, such as servers, wen applications, laptops, desktops, tablets, smartphones, and numerous others.

Penetration testing is also referred to as ethical hacking. Though both refer to the same concept, there is a difference between the two. Penetration testing is performed on a specific information system or as a specific objective while ethical hacking has a more broad objective, which includes all other hacking methods, and other activities to combat and mitigate cyber-attack. You can consider penetration testing as a subset of ethical hacking techniques. It suffices to say that an ethical hacker needs to have a more comprehensive knowledge of the hacking methodologies than a penetration tester.

--- Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support
  continue reading

20集单集

Artwork
icon分享
 
Manage episode 292613663 series 2926569
内容由Joy Alatta提供。所有播客内容(包括剧集、图形和播客描述)均由 Joy Alatta 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

The decision to conduct penetration testing is an indication of the importance of risk management in any organization. It is a good professional practice to document security policies that outlines how penetration testing should be conducted and how it relates to different types of systems, such as servers, wen applications, laptops, desktops, tablets, smartphones, and numerous others.

Penetration testing is also referred to as ethical hacking. Though both refer to the same concept, there is a difference between the two. Penetration testing is performed on a specific information system or as a specific objective while ethical hacking has a more broad objective, which includes all other hacking methods, and other activities to combat and mitigate cyber-attack. You can consider penetration testing as a subset of ethical hacking techniques. It suffices to say that an ethical hacker needs to have a more comprehensive knowledge of the hacking methodologies than a penetration tester.

--- Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support
  continue reading

20集单集

Semua episod

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

快速参考指南