• LOGIN
    • No products in the cart.

The access to this course is restricted to PenTest Premium or IT Pack Premium Subscription

 The access to this course is restricted to PenTest Premium or IT Pack Premium Subscription


How to create a good and effective penetration testing report?

Why is a penetration test report so important?
Who is the report for?
What should the report contain?


4 CPE CREDITS


Penetration test or pentest is a typical security assessment which is the process to gain access to specific information assets (eq. computer systems, network infrastructure, or application). Penetration test simulates the attack performed internally or externally by the attackers which has the intention to find security weaknesses or vulnerabilities and validate the potential impacts and risks should those vulnerabilities being exploited.
Security issues found through penetration test are presented to the system’s owner, data owner or risk owner. Effective penetration test will support this information with accurate assessment of the potential impacts to the organization and range of technical and procedural safeguards should be planned and executed to mitigate risks.
Many penetration testers are in fact very good in technical since they have skills needed to perform all of the tests, but they are lack of report writing methodology and approach which create a very big gap in penetration testing cycle. A penetration test is useless without something tangible to give to a client or senior management. Report writing is a crucial part for any service providers (eq. IT service/advisory). A report should detail the outcome of the test and, if you are making recommendations, document the recommendations to secure any high-risk systems.
The target audience of a penetration testing report will vary, technical report will be read by IT or any responsible information security people while executive summary will definitely be read by the senior management.
Writing an effective penetration testing report is an art that needs to be learned and to make sure that the report will deliver the right information to the targeted audience.


After completing this course you will be able to: 

  • Understand on how to create a good and effective penetration testing report.
  • Understand the mechanism to provide an effective deliverables.
  •  Apply risk management knowledge & skills and blend them in your deliverables.

WITH THIS COURSE, YOU GET A BONUS OF ALL MATERIALS IN ONE PDF, ALONG WITH SAMPLE REPORTS! 


COURSE SYLLABUS

What will you learn in this workshop


 

Module 1

  • Introduction
  • High-Level Security Assessment
  • Tools of the Trade
  • Business Case
  • Planning and Preparation
  • Risk Management
  • Gathering and Translating Raw Data
  • Project Proposal
  • Project Activities
  • Deliverables

Module 2

  • Technical Report Writing
  • Standards and Templates
  • Report Format
  • Content Structure
  • Things to Focus on
  • Things to Emphasize
  • Dos and Don’ts
  • Reporting Best Practices

Module 3

  • Document History (Versioning)
  • Error Checking and Revision
  • Dissecting Report
  • Sample Reports
  • Additional Things to Remember
  • Writing Your 1st Report
  • Polishing Your Report
  • Maintaining Your Report
  • Converting Your Report Format

Module 4

  • Putting Them Together
  • Enhancing Your Report
  • Housekeeping
  • Summary and Conclusion

 


Your instructor: Semi Yulianto

w9 instructor

Founder/Senior Consultant/Technical Trainer @ SGI Asia

More than 20 years working experience in the IT industry with experiences in the area of Application and Software Development (Database and Management).

Read more here: https://pentestmag.com/members/semiyulianto/

TAKE THIS COURSE
  • Membership Access Monthly
  • UNLIMITED ACCESS
  • Course Certificate
189 STUDENTS ENROLLED
  • Profile photo of Yasmeen Adel
  • Profile photo of xla
  • Profile photo of ceronra
  • Profile photo of dariusz.lipka
  • Profile photo of Jeremiah Lawrence
  • Profile photo of cbraxton

Certificate Code