Penetration Testing
Penetration testing, also referred to as pen testing, involves attempting to break into a system to better identify cybersecurity weaknesses so that the security posture can be improved. It is typically conducted by ethical hackers who have an offensive security lens.
Penetration Testing vs. Assessments
A pen test is different from a vulnerability assessment in that pen testers are actively trying to exploit vulnerabilities, simulating a cyber attack. The process may involve setting the goals and scope for the attack, conducting initial research, using a variety of methods to break into a system, seeing what access and damage is possible, and reporting on the work.
Ultimately, the goal is for clients to have a detailed understanding of where they are vulnerable and to help them to become as secure as possible.
Pen Testers
Pen testing is conducted by ethical hackers who have permission to hack a client’s systems. Pen testers may be outsourced or in-house, sitting on the red team of a security organization. They use a diverse skill set including knowledge of network security, operating systems, software vulnerabilities, and IT administration to conduct their work.
Contribute to Docs
- Learn more about how to get involved.
- Edit this page on GitHub to fix an error or make an improvement.
- Submit feedback to let us know how we can improve Docs.
Learn Cybersecurity on Codecademy
- Course
Introduction To Ethical Hacking
In this course, you will learn what it means to be an Ethical Hacker, and practice tools and techniques used to hack ethically.With CertificateBeginner Friendly1 hour - Skill path
Scan Systems with Nmap
Learn about Nmap and see why it's such a popular tool for ethical hacking and ethical hackers.Includes 5 CoursesWith CertificateBeginner Friendly4 hours