0% found this document useful (1 vote)
1K views1 page

CPENT

This document provides an overview of penetration testing techniques including open source intelligence gathering, social engineering, external and internal network testing, analyzing perimeter devices, web applications, wireless networks, IoT devices, OT/SCADA systems, cloud infrastructure, and binary analysis. It also covers reporting and post-testing activities.

Uploaded by

Chiến Nguyễn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
1K views1 page

CPENT

This document provides an overview of penetration testing techniques including open source intelligence gathering, social engineering, external and internal network testing, analyzing perimeter devices, web applications, wireless networks, IoT devices, OT/SCADA systems, cloud infrastructure, and binary analysis. It also covers reporting and post-testing activities.

Uploaded by

Chiến Nguyễn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

Introduction to Penetration Testing

Penetration Testing Scoping and Engagement


Open Source Intelligence (OSINT)
Social Engineering Penetration Testing
Network Penetration Testing � External
Network Penetration Testing� Internal
Network Penetration Testing � Perimeter Devices
Web Application Penetration Testing
Wireless Penetration Testing
IoT Penetration Testing
OT/SCADA Penetration Testing
Cloud Penetration Testing
Binary Analysis and Exploitation
Report Writing and Post Testing Actions

You might also like