Book Image

Practical Pentesting [Video]

By : ACI Learning, Daniel Lowrie, Brad Stine
Book Image

Practical Pentesting [Video]

By: ACI Learning, Daniel Lowrie, Brad Stine

Overview of this book

The course begins by introducing the fundamentals of penetration testing, distinguishing the roles of pentesters – the good, the essential, and the challenges they face. It lays the groundwork with pre-engagement essentials, including data security agreements and crafting a detailed Statement of Work (SOW), ensuring clarity and legal safeguarding before any testing begins. The course focuses on the pentesting methodology, guiding you through the stages of assessment from validating scope to reconnaissance, vulnerability scanning, and exploitation. It emphasizes the importance of maintaining access, covering tracks, and preparing comprehensive deliverables to ensure actionable insights for enhancing security. The course wraps up by exploring personal engagement toolkits and pentesting platforms, providing practical knowledge for effective pentesting. It also touches upon blue team pentesting, highlighting the collaborative effort required in cybersecurity to protect against threats.
Table of Contents (9 chapters)
Chapter 5
Final Authorization Essentials
Content Locked
Section 1
Final Authorization
In this episode, Daniel and Brad introduce you to the Pentester's best friend; final authorization. Basically, final authorization is the signed statement that gives you the right to legally do illegal things like access secured areas and systems. Here we go over what a final authorization form consists of and the importance of always having a copy of your "Get Out of Jail Free" card.