Free Excel Skills Assessment

Very short questionnaire to establish your skill level with Microsoft Excel.

Excel Assessment

Free Microsoft Word Skills Assessment

Very short questionnaire to establish your skill level with Microsoft Word.

Word Assessment

Free PowerPoint Skills Assessment

Very short questionnaire to establish your skill level with Microsoft PowerPoint.

PowerPoint Assessment

So What Is Penetration Testing

Our Instructors - A Near Perfect Score Our Instructors - A Near Perfect Score
Previous Article
Ransomware, what is that? Ransomware, what is that?
Next Article

What you need to know

Penetration Testing

Penetration Testing, sometimes referred to as pentest, is a real-time test with the aim of gaining access to resources and data inside an organisation. Of course this data should be protected from unauthorised access but we utilise penetration testing in order to discover any vulnerabilities. In order to achieve this, a variety of exploits & attacks, like social engineering and other techniques are utilised.

So what is social engineering? Well the video below explains it very well:

How important is Penetration Testing?

Well the short answer is, very. Of course most companies want to secure their data infrastructure, but a lot of companies don’t prioritise it until after they have learned the hard way. IT managers should also keep in mind that there are laws and regulations for the protection of data. There can also be big financial costs to loss of data in companies.

Benefits of Penetration Testing

  • Compliance with regulatory requirements, avoid fines
  • Identification and management of vulnerabilities
  • Avoidance of network downtime and the resulting costs
  • Preserve corporate image and maintain customer loyalty
  • Justify the security investments

Security Definitions

Vulnerabilities A vulnerability is a weakness in a mechanism that can threaten the confidentiality, integrity, or availability of an asset. A simpler way of putting it would be to say that it is a security hole in either an Operating System, a program or a piece of hardware that could potentially provide an angle to attack the system. It could also be something as simple as a weak password.
Threat Someone uncovering a vulnerability and exploiting. Unlike what most people think, the enemy does not only reside outside the gates, there are also internal threats we have to deal with.
Risk Probability of a threat becoming real and the corresponding potential damages. Some threats are most likely to occur than others and some are bound to cause more damage. We need to assess all of them.
Exposure When a threat agent exploits a vulnerability.
Counter measure A control put into place to mitigate potential losses.

So what do I do now?

So you are concerned about protecting your company’s data and are wondering what to do next. Well getting certified in Certified Ethical Hacker Program (CEH) will give you the skills needed to keep up to date with the latest methods of Ethical Hacking and Security Assessment.

Read more here

Check out our security courses here

/ Author: Liam Phelan / Number of views: 3245 / Comments: 0 /

Theme picker



Subscribe to our Newsletter

cheat sheet resources

Subscribe to our Newsletter for all the latest cheat sheets and resources.


Follow us on Linkedin for the lastest cheat sheets and learning resources