starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Job Roles
  2. >
  3. Penetration Testers

Penetration Testers

What does a professional in this career do?

Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.

In this job you will...

  • Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
  • Collect stakeholder data to evaluate risk and to develop mitigation strategies.
  • Conduct network and security system audits, using established criteria.
  • Configure information systems to incorporate principles of least functionality and least access.
  • Design security solutions to address known device vulnerabilities.
  • Develop and execute tests that simulate the techniques of known cyber threat actors.
  • Develop infiltration tests that exploit device vulnerabilities.
  • Develop presentations on threat intelligence.
  • Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
  • Discuss security solutions with information technology teams or management.
  • Document penetration test findings.
  • Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.
  • Gather cyber intelligence to identify vulnerabilities.
  • Identify new threat tactics, techniques, or procedures used by cyber threat actors.
  • Identify security system weaknesses, using penetration tests.
  • Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
  • Keep up with new penetration testing tools and methods.
  • Maintain up-to-date knowledge of hacking trends.
  • Prepare and submit reports describing the results of security fixes.
  • Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
  • Update corporate policies to improve cyber security.
  • Write audit reports to communicate technical and procedural findings and recommend solutions.

Skills You Will Gain

Exploit Development
Network and Application Security
Penetration Testing Methodologies
Risk Management and Mitigation
Vulnerability Assessment

Representative Journeys

Foundations of Cybersecurity
Foundations of CybersecurityKevin Cardwell | Cybersecurity | 3 hrs and 30 mins

Launch Journey

analyzing-and-defending-networks-with-wireshark
Analyzing and Defending Networks with Wireshark
Kevin CardwellSkills: HackingTCP/IPWireshark

Journey Completed

Related roles

Computer and Information Systems Managers

Computer and Information Systems Managers

Computer Network Support Specialists

Computer Network Support Specialists

Information Security Engineers

Information Security Engineers

Information Security Analysts

Information Security Analysts

  • Application Security Assessor
  • Application Security Hacker
  • Application Security Tester
  • Certified Hacker
  • Certified Tester
  • Consulting Advisory Tester
  • Cyber Assessment Tester
  • Cyber Assessor
  • Cyber Security Engineer
  • Cyber Security Tester
  • Cyber Tester
  • Cybersecurity Engineer (Cyber Engineer)
  • Embedded Tester
  • Forensic Analysis Tester
  • Hacker
  • Hardware Hacker
  • Information Security Analyst
  • Information Security Assessor
  • IT Security Tester (Information Technology Security Tester)
  • Network Security Engineer
  • Network Security Tester
  • Penetration Tester
  • Penetration Testing Consultant
  • Risk Tester
  • Security Application Tester
  • Security Architect
  • Security Assessment Tester
  • Security Automation Tester
  • Security Consultant
  • Security Consulting Tester
  • Security Engineer
  • Security Tester
  • Systems Security Tester
  • Tester
  • Vulnerability Analyst
  • Vulnerability Assessment Analyst

SOME OF THE INSTRUCTORS AND EXPERTS SUPPORTING YOU ON THESE JOURNEYS

Analyzing and Defending Networks with Wireshark

Analyzing and Defending Networks with Wireshark