Description
Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:
- What is penetration testing
- Testing Stages
- Testing Methods
- Testing, web applications and firewalls
Your paper should meet the following requirements:
- Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
- Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.
Running head: PENETRATION TESTING
1
Penetration Testing Research
Name
Instructor
Course and Title
Date
PENETRATION TESTING
2
Table of Contents
Introduction ..................................................................................................................................... 3
Purpose of Penetration testing ........................................................................................................ 3
Associated Testing Stages............................................................................................................... 4
Testing Methods.............................................................................................................................. 5
Testing and WAF ............................................................................................................................ 6
Conclusion ...................................................................................................................................... 7
PENETRATION TESTING
3
Penetration Testing
Introduction
Penetration testing focuses on testing the computer system for any forms of
vulnerabilities that can leave it a weak target for the attackers. It takes an automated form that
ensures computerized testing (Rahalkar, Rahalkar & Karkal, 2019). Regardless, the cycle
incorporates gathering information about the goal before the test, recognizing possible section
centres, trying to break in either a genuine or a virtual way, and uncovering the issues.
Purpose of Penetration testing
A pen test is mandated for testing any form of a security vulnerability in a system. It's
used to test organization's security technique, its adherence to consistence necessities, its agents'
security care, and the affiliation's ability to recognize and respond to security scenes (Nagpure &
Kurkure, 2017). Commonly, vulnerabilities that are perceived and abused through pen testing are
amassed and g...
