From the course: Security Testing Essential Training
Unlock the full course today
Join today to access over 23,200 courses taught by industry experts.
Data analysis
From the course: Security Testing Essential Training
Data analysis
- [Narrator] Although reporting is often reserved for the final stage of a security assessment, you should be analyzing your findings, as you go. This sounds easier to do than it is in practice, though. I believe one of the reasons for this challenge is the nature of the work itself. Security assessments, particularly penetration tests, can be both intriguing and exciting. Part of the appeal of working in this field, is that penetration testers are explicitly authorized to do things that they might very well be arrested for, under different circumstances. Even better, we're not just allowed to do this, we're paid for our efforts. Many of the penetration testers I know, are inherently curious. And they enjoy playing games and solving puzzles. That part of the brain that works through seemingly disconnected bits of information and forms meaningful patterns, is a part of the brain that makes pen testers good at what they do.…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.