Security Analyst, Part 2 of 4: Penetration Testing Overview
with expert Don Bowers
There are many ways and methodologies designed to analyze the information security needs of a corporation or government entity. One of the best ways to analyze the security posture of an organization is through penetration testing. Examine the fundamentals of penetration testing including limits (known as the Scope of Work), the several phases of PTests, and additional methodologies and guidelines. Additionally, the importance of information security auditing and vulnerability assessments will be discussed, as well as legal concerns and risks that may arise for both the penetration tester and the organization being tested.
Beginner | 2h 5m | July 21, 2017
Course OutlineDon Bowers
Don Bowers has been in the computer industry for over 36 years as a database programmer and an information systems and security analyst. Don’s primary focus over the last 10 years has been in the area of information security and digital forensics. Don currently serves as an Assistant Professor and the Program Chair for the Cybersecurity program at the College of Western Idaho. As well as being an associate professor Don also holds the distinction of being a Certified EC-Council Instructor. Don holds several industry certifications including MCITP Enterprise, MCSE + Security, CISSP, CISA, CEH, CHFI, ECSA (EC-Council Security Analysis), LPT (Licensed Penetration Tester) and ACE (AccessData Certified Examiner).