Categories
Cyber Security TECH & CYBERSECURITY

The 8 Phases of Cyber Security Testing

Unlike the previous post: The 5 Phases Of Hacking. This procedure mostly resonates with cybersecurity professionals and/or ethical hackers. 1. SCOPING Determining the rules of engagement for the assessment. 2. Reconnaissance Also known as Information Gathering. Gather Relevant information and enumerate the attack surface. 3. Vulnerability Assessment Also known as Scanning and Enumeration. Identify vulnerabilities […]