Pluralsight - Penetration Testing The Big Picture
- Type:
- Video > Other
- Files:
- 29
- Size:
- 174.66 MB
- Uploaded:
- Oct 30, 2017
- By:
- Tobimaroo
As more businesses create, collect, and manage large volumes of customer data and provide access to that data through mobile apps, the Web, and IoT devices, there are more opportunities for that data to be compromised and stolen by nefarious individuals, criminal groups, and even governments. Organizations are struggling to improve the accessibility to and increase the value of their intellectual property while simultaneously protecting it from unauthorized exposure. As news in the past few years has shown this is a significant challenge and many organizations lost control over their customer's data and their own intellectual property. Penetration testing is one technique that organizations use to find and correct weaknesses in their network and systems before someone else does. First, you will learn how penetration testing serves as key component in an organization's information security management program. Next you will learn about the penetration testing process and techniques used to discover and exploit vulnerabilities