Demystifying Penetration Testing
-An overview of how Vulnerability Assessment (VA) & Penetration T An overview of how Vulnerability Assessment (VA) & Penetration Testing (PT) is esting (PT) is done
-Defining scope of the assessment Defining scope of the assessment
-Types of Penetration Testing Types of Penetration Testing
-A brief understanding on how Buffer Overflow works A brief understanding on how Buffer Overflow works
- How vulnerabilities are scanned and exploited How vulnerabilities are scanned and exploited
- What are the end results What are the end results
- What a Penetration Testing Report should contain