IT Security Champion: Pen Tests
This course will provide a brief overview of how a security pen test is used to discover systems which may be compromised by an unauthorized hacker.
The purpose of IT security is to protect IT assets of an organization as well as to protect employee and customer privacy. In this course, IT Security Champion: Pen Tests, you’ll learn about how pen tests are used in an organization and why they are important. First, you’ll explore the different types of pen tests and how they are applied. Next, you’ll discover what an IT analyst’s role is in pen testing. Finally, you’ll learn the types of technical vulnerabilities a pen tester is seeking to find and exploit. When you’re finished with this course, you’ll understand what a pen test seeks to accomplish as well as the role of an IT analyst in the pen testing process.
Author Name: Ross Bagurdes
Author Description:
Ross has had a diverse career. He has a Structural Engineering degree from Milwaukee School of Engineering, but gave up the career shortly after graduating from college. Beginning in 1997, Ross began officially working in IT, implementing and supporting a paperless work order system for a Natural Gas Utility in Illinois. Since then, Ross has spent his years teaching and managing data networks. Ross spent 7 years at University of Wisconsin Hospitals and Clinics, supporting and managing the large … more
Table of Contents
- IT Security Champion: Pen Tests
13mins
There are no reviews yet.