All of the information a pentester has learned about a target system will mean nothing if that information can’t reach the client. In this course, five videos take you through the details of reporting and communication after a pentest has concluded: communications, report writing, mitigation strategies (now that they know they have a problem, how do you recommend they fix it?) and post-report activities.
Introduction to Reporting and CommunicationDuration: 1:52
Pentest CommunicationsDuration: 8:40
Report WritingDuration: 7:56
Mitigation StrategiesDuration: 7:25
Post-report ActivitiesDuration: 4:17
Meet the author
Jason Dion specializes in providing actionable information you can use to further your cybersecurity and information technology career. His IT certification and training courses teach you real-world application of the skills needed to face today's cybersecurity challenges.
Dion is an instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, PRINCE2, PRINCE2 Agile and ITIL.
You're in good company
"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had."
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"I’ve taken five boot camps with Infosec and all my instructors have been great."