Penetration or "Pen" testing as it's commonly referred to, was discussed in a previous module, but we include a review here since this type of testing is also an important part of developing secure software. The topics covered in this video are: - White box or clear box testing - source code is fully visible and the tester is typically a programmer with knowledge of the code. - Black box testing - zero knowledge test, simulates an attacker. - Fuzzing - fault injection testing, verifies input validation. - Scanning - map the environment to gather info. - Pen testing - active tests which attempt to exploit weaknesses found from scanning. Finally, in order for pen testing to be complete, the attacker's tracks must be covered in order to foil discovery of the attack. The process is then concluded with reporting.
They are responsible for knowing where a network's possible vulnerabilities are and providing mitigation strategies to combat them. An effective Cyber Security Operations Manager will have experience in a technical security role including ...