Computer Science > STUDY GUIDE > 7COM1068-PT Portfolio, Penetration Testing IT>13 Pentesing. (All)
Contents 1 Introduction 4 1.1 Overview 4 2 Task 1 – The impact of GDPR in the cyber security arena 5 2.1 Information Environment Definition 5 2.2 What is Cyber security? 5 2.3 What is GDPR? 5 ... 2.4 ‘Hacking’ definition & explanation 6 2.5 Impact of GDPR in Cyber Security 7 2.6 Criticism of GDPR 7 3 Task 2 – SOP for PenTesting 8 3.1 Penetration Test 8 3.2 Methodologies 8 3.3 Standard Operating Procedure of Pen Testing 9 Phase 1: Information gathering 9 Phase 2: Scanning & Enumeration 9 Phase 3: Vulnerability Analysis 10 Phase 4: Maintaining Access 10 Phase 5: Exploitation 10 Phase 6: Analysis and Reporting 10 Phase 7: Cleaning Up 10 3.4 Decision Tree 11 [Show More]
Last updated: 3 years ago
Preview 1 out of 31 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Apr 26, 2021
Number of pages
31
Written in
All
This document has been written for:
Uploaded
Apr 26, 2021
Downloads
0
Views
60
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·