Reporting Overview

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

13 hours 9 minutes
Video Transcription
hello and welcome to another penetration. Testing, execution. Standard discussion. Today we're going to get into reporting, and we're going to start that off with an overview. So
we're first going to start off in the reporting structure where we'll discuss reporting intentions and reporting Resource is, well, then touch on the executive summary by going over what is an executive summary and an example of an executive summary layout?
Well, they look at the technical report will discuss what it is and some of the reports sections that include the introduction, information gathering, passive and active intelligence, vulnerability, assessment, exploitation, vulnerability, confirmation, poised post exploitation, risk exposure and the overall conclusion of the report.
This will all make up the reporting component of the Pee test standard and the last section of the standard as well. So with that in mind, I look forward to seeing you again soon.
Up Next
Penetration Testing Execution Standard (PTES)

In this course we will lay out the Penetration Testing Execution Standard (PTES) in all its phases and their application for business leaders and Security Professionals alike.

Instructed By