
In this video from our Web Application Penetration Test Reporting online course by Chrissa Constantine, you'll learn about the pentester liability, risk, and responsibility associated with working as a professional in the field. Pentester liability is especially important when you're signing a contract for a pentesting engagement, it's worth educating yourself about it!
Penetration Testing deliverables include a final report showing services provided, methodology, findings, and recommendations to remediate or correct issues discovered during the test. This course will show you how to use tools in Kali to help with reporting and to learn about methodologies. A penetration testing methodology is required to conduct the pen test in a consistent and standardized way for repeatable results.
One of the main questions a client will ask a pentester is what methodology is used for testing their assets. It is important to learn this to help clients understand how testing is conducted and to provide them with a deliverable that supports the findings. It is important to understand the basics of reporting prior to starting a pentest because findings need to be conveyed to a client in a way they can understand and then correct the issues.
By the end of the course, you will have materials that can be used on pen testing engagements. This includes a report template, reading materials for reference, and an understanding of various methodologies and ways to fit a methodology to a client’s requirement for a pentest.
Why this course?
Related Posts
Author

Latest Articles
Blog2022.03.28Footprinting Firewalls | Reconnaissance Tutorial [FREE COURSE CONTENT]
Blog2022.03.17Process Hollowing Malware | Reverse Engineering Tutorial [FREE COURSE CONTENT]
Blog2022.03.09Sniffing BLE packets | IoT Hacking Tutorial [FREE COURSE CONTENT]
Blog2022.02.18Pass The Hash Attacks in Active Directory [FREE COURSE CONTENT]