Pen Testing: Reporting
Offered By: Pluralsight
Course Description
Overview
The quality of a penetration test report can often determine just how effective the remediation effort is, it’s important to get it right! This course will teach you how to create a report that will both stand up to scrutiny and help the customer.
Penetration testing brings together various technical skills. Producing a report at the end of a test, however, requires some very different abilities. In this course, Pen Testing: Reporting, you’ll learn to produce a report that details the results of a penetration test in a digestible format, conveying all of the information a customer needs to remediate their vulnerabilities. First, you’ll discover the details you should put into each vulnerability within the report. Next, you’ll explore the key areas of a report and why they should be there. Finally, you’ll learn how to streamline the reporting process, so you can spend less time reporting and more time performing the test itself. When you’re finished with this course, you’ll have all of the reporting skills and knowledge you need to produce a valuable penetration test report.
Penetration testing brings together various technical skills. Producing a report at the end of a test, however, requires some very different abilities. In this course, Pen Testing: Reporting, you’ll learn to produce a report that details the results of a penetration test in a digestible format, conveying all of the information a customer needs to remediate their vulnerabilities. First, you’ll discover the details you should put into each vulnerability within the report. Next, you’ll explore the key areas of a report and why they should be there. Finally, you’ll learn how to streamline the reporting process, so you can spend less time reporting and more time performing the test itself. When you’re finished with this course, you’ll have all of the reporting skills and knowledge you need to produce a valuable penetration test report.
Syllabus
- Course Overview 1min
- Documenting Vulnerabilities 17mins
- Including Key Elements in a Report 17mins
- Ensuring Quality 14mins
- Streamlining the Reporting Processes 16mins
Taught by
Gavin Johnson-Lynn
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent