Course taster

Unit summary

In this unit, we have explored the techniques used by pen testers when assessing if a network is vulnerable or secure. We have explored the five techniques of pen testing and the five steps of pen testing when creating a structured network evaluation. We have looked at the general tools and steps used to start a network hardening process in an organisation, in addition to the benefits of network hardening.