Course

Get the right security testing

Most organizations ask for penetration testing, yet are sold vulnerability scanning. You’ll learn how to differentiate these terms and figure out what best supports your security testing goals.

    Syllabus

  • Bug bounty programs Video — 00:16:28
    • Understanding how bug bounty programs fit into your overall security testing strategy.

  • What is ‘penetration testing,’ anyway? Video — 00:20:59
    • Differentiating penetration testing from vulnerability scanning from vulnerability assessments, what each is and when to use each.

  • Big ideas Video — 00:03:03
    • A summary of the key points of this course.

  • Case study: A vulnerability assessment in action Video — 00:17:18
    • A story about a real-world vulnerability, what happened and the key insights to take away from it.

  • Get the right security testing overview Video — 00:01:51
    • A brief introduction to the ideas that this course section will cover.

Syllabus

Course description

If a system has something worth protecting, companies usually invest in security testing to determine if the system has weaknesses. But what are you actually getting? This course examines the widespread confusion about security assessment terms, so you can differentiate what is what and get the right outcomes.

You're in good company

CY

We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.

Caleb Yankus

DS

This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.

Daniel Simpson

IS

We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.

Infosec Skills Teams client

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Award-winning training that you can trust

Comprehensive Cybersecurity Training - Infosec Skills
Cybersecurity Education and Training Gold Award - Infosec IQ
Top Rated Award - Infosec Skills
2021 G2 Summer - Leader - Tech Skills Dev, Online Course, eLearning Content
Top 20 Company - Online Learning Library