Introducing types of pentests and pentesting process.
In this lecture, you will learn the most common and useful approaches for pentesting process which contains:
Planning, Reconnaissance, Scanning, Exploiting, Privilege Escalation, Cleaning-Up, Reporting
And also the types of pentests, such as;
External Network Segment, Internal Network Segment, Web Applications and Services, Wireless networks,
Servers, Network Devices, Databases, Internal Client Applications, Social Engineering, DDoS and Physical Security