SlideShare a Scribd company logo
Vulnerability
scanning vs.
penetration testing.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certification
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Vulnerability scanning and penetration
testing.
– Levels of testing.
PACE-IT.
Page 4
Vulnerability scanning vs. penetration testing.
Page 5
Vulnerability scanning is
usually conducted using
specialized applications in
an effort to find weaknesses
in a network.
It is usually conducted using protocol analyzers (also called
packet sniffers) and port scanners. These applications can be
used to determine which protocols and services are being used
on a network. Protocol analyzers can also be used to determine
which ports are open on a network. This information can be used
by security experts to help harden the network against attack.
Vulnerability scanning does not attempt to exploit any
weaknesses that are found. It only identifies them for the security
personnel.
Vulnerability scanning vs. penetration testing.
Page 6
– Vulnerability scanning.
» The purpose is to assess the configuration of systems and
networks to determine what can be done to increase the level
of security.
• This is done passively by collecting information and reporting
on the information collected in a non-intrusive manner.
» The scan can help to identify different issues.
• Lack of security controls.
• Common misconfigurations (in applications and devices).
• Other vulnerabilities.
» Two different types of vulnerability scans should be conducted.
• As an authorized user—a credentialed scan should be
conducted from an administrative account.
• As an unauthorized user—a noncredentialed scan should
be conducted to determine what an unauthorized user may
find out about the system.
» A false positive may be reported by vulnerability scans.
• Something reported as a vulnerability that isn’t actually one.
Vulnerability scanning vs. penetration testing.
Page 7
Penetration testing (or pen
testing) is actively seeking to
find vulnerabilities in
networks and systems that
can be exploited.
Once a weakness is found, the pen tester then attempts to exploit
the vulnerability. Many organizations use pen testing as a means
of increasing the security of their organizations; however, hackers
also use pen testing as a means of finding networks and systems
that they can exploit.
As a result, every security expert must be sure to receive explicit
authorization to perform pen testing before beginning the test. If
such authorization is not obtained, a security expert could face
dire consequences. Unauthorized pen testing is, in actuality,
illegal—as it is a form of hacking.
Vulnerability scanning vs. penetration testing.
Page 8
– Penetration testing (pen testing).
» The purpose is to assess the security of a system or network
by actually using the same methods that a hacker would use to
breach security.
» The test can be used to verify that a threat exists.
• Can also confirm that the threat doesn’t exist.
» The test seeks to actively test and bypass any security controls
that may be present.
» It is designed to exploit any vulnerabilities that may be present
on the system or network.
» Unauthorized pen testing may lead to legal issues.
Vulnerability scanning vs. penetration testing.
Page 9
Vulnerability scanning vs. penetration testing.
Page 10
It is vital that, when security
tests are conducted on
systems and networks, the
testing be conducted at a
variety of levels.
The first level of security testing should be done at the white box
level. White box testing is when the person conducting the test
has the exact details of the system or network; the tester has
intimate knowledge of what is present and how it is configured.
The next level of security testing is done at the gray box level.
With gray box testing, the tester has an intermediate knowledge
of the how the system or network is configured.
The final level of security testing is done at the black box level.
With black box testing, the tester (usually a security expert) is
given no prior knowledge of the configuration or what is present.
Vulnerability scanning vs. penetration testing.
Page 11
Vulnerability scanning vs. penetration testing.
Vulnerability scanning is the passive collection of information on the
configuration of systems and networks in an effort to determine how
security might be improved. Penetration testing is using attack methods in
an effort to breach security. The information gathered from pen testing is
used to increase the security of systems and networks. The pen tester must
have explicit permission to perform the testing, because without the
permission it is actually an illegal action.
Topic
Vulnerability scanning and
penetration testing.
Summary
To ensure a thorough assessment of security, testing should be conducted
at different levels. The levels of testing should include: white box testing—
the tester has intimate knowledge of the system or network, gray box
testing—the tester has an intermediate knowledge of the system or
network, and black box testing—the tester has no knowledge of the system
or network.
Levels of testing.
Page 12
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PPTX
PACE-IT, Security+2.8: Risk Management Best Practices
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
PPTX
PACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+2.9: Goals of Security Controls

What's hot (20)

PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PPTX
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PPTX
PACE-IT, Security+1.3: Cloud Concepts
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
PPTX
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PPTX
PACE-IT, Security+2.8: Disaster Recovery Concepts
PPTX
PACE-IT, Security+ 2.5: Incident Response Concepts
PPTX
PACE-IT: Common Threats (part 2)
PPTX
Pace IT - Common Security Threats
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PPTX
PACE-IT: Common Threats (part 1)
PPTX
PACE-IT: Basic Forensic Concepts
PPTX
PACE-IT: Risk and Security Related Concepts
PPTX
PACE-IT, Security+2.6: Security Related Awareness and Training
PPTX
PACE-IT: IT Security Measures
PPTX
PACE-IT: Common Network Security Issues
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PPTX
PACE-IT: Physical Network Security Control
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+1.3: Cloud Concepts
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT: Common Threats (part 2)
Pace IT - Common Security Threats
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT: Common Threats (part 1)
PACE-IT: Basic Forensic Concepts
PACE-IT: Risk and Security Related Concepts
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT: IT Security Measures
PACE-IT: Common Network Security Issues
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT: Physical Network Security Control
Ad

Viewers also liked (20)

PPTX
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security+3.1: Types of Malware
PDF
Symantec Data Loss Prevention 11
PPTX
Intrusion prevention systems
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security+3.1: Types of Malware
Symantec Data Loss Prevention 11
Intrusion prevention systems
Ad

Similar to PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing (20)

PPTX
PACE-IT: Network Access Control
PDF
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
PDF
Penetration Testing Service in India Senselearner .pdf
DOCX
Backtrack manual Part1
DOCX
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
PDF
RAMNSS_2016_service_porfolio
PPTX
Phi 235 social media security users guide presentation
PPTX
Pace IT - Troubleshooting Security
PDF
An overview of network penetration testing
PDF
Network Penetration Testing Service
PDF
The Art of Penetration Testing in Cybersecurity.
PPTX
Pace IT - Prohibited Content and Activity
PDF
pentration testing.pdf
PPTX
Pen Testing Explained
PDF
Nessus Assesment Vulnerability Management.pdf
PDF
What are the 5 Stages of Penetration.pdf
DOCX
Best Practices, Types, and Tools for Security Testing in 2023.docx
PPT
Security testing
PDF
(VAPT) Vulnerability Assessment And Penetration Testing
PDF
Itis pentest slides hyd
PACE-IT: Network Access Control
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Penetration Testing Service in India Senselearner .pdf
Backtrack manual Part1
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
RAMNSS_2016_service_porfolio
Phi 235 social media security users guide presentation
Pace IT - Troubleshooting Security
An overview of network penetration testing
Network Penetration Testing Service
The Art of Penetration Testing in Cybersecurity.
Pace IT - Prohibited Content and Activity
pentration testing.pdf
Pen Testing Explained
Nessus Assesment Vulnerability Management.pdf
What are the 5 Stages of Penetration.pdf
Best Practices, Types, and Tools for Security Testing in 2023.docx
Security testing
(VAPT) Vulnerability Assessment And Penetration Testing
Itis pentest slides hyd

Recently uploaded (20)

PDF
Pre independence Education in Inndia.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
master seminar digital applications in india
PDF
Basic Mud Logging Guide for educational purpose
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Lesson notes of climatology university.
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pre independence Education in Inndia.pdf
PPH.pptx obstetrics and gynecology in nursing
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
O7-L3 Supply Chain Operations - ICLT Program
01-Introduction-to-Information-Management.pdf
Renaissance Architecture: A Journey from Faith to Humanism
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Pharma ospi slides which help in ospi learning
Final Presentation General Medicine 03-08-2024.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Complications of Minimal Access Surgery at WLH
Pharmacology of Heart Failure /Pharmacotherapy of CHF
2.FourierTransform-ShortQuestionswithAnswers.pdf
master seminar digital applications in india
Basic Mud Logging Guide for educational purpose
Abdominal Access Techniques with Prof. Dr. R K Mishra
Lesson notes of climatology university.
O5-L3 Freight Transport Ops (International) V1.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx

PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certification  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Vulnerability scanning and penetration testing. – Levels of testing. PACE-IT.
  • 4. Page 4 Vulnerability scanning vs. penetration testing.
  • 5. Page 5 Vulnerability scanning is usually conducted using specialized applications in an effort to find weaknesses in a network. It is usually conducted using protocol analyzers (also called packet sniffers) and port scanners. These applications can be used to determine which protocols and services are being used on a network. Protocol analyzers can also be used to determine which ports are open on a network. This information can be used by security experts to help harden the network against attack. Vulnerability scanning does not attempt to exploit any weaknesses that are found. It only identifies them for the security personnel. Vulnerability scanning vs. penetration testing.
  • 6. Page 6 – Vulnerability scanning. » The purpose is to assess the configuration of systems and networks to determine what can be done to increase the level of security. • This is done passively by collecting information and reporting on the information collected in a non-intrusive manner. » The scan can help to identify different issues. • Lack of security controls. • Common misconfigurations (in applications and devices). • Other vulnerabilities. » Two different types of vulnerability scans should be conducted. • As an authorized user—a credentialed scan should be conducted from an administrative account. • As an unauthorized user—a noncredentialed scan should be conducted to determine what an unauthorized user may find out about the system. » A false positive may be reported by vulnerability scans. • Something reported as a vulnerability that isn’t actually one. Vulnerability scanning vs. penetration testing.
  • 7. Page 7 Penetration testing (or pen testing) is actively seeking to find vulnerabilities in networks and systems that can be exploited. Once a weakness is found, the pen tester then attempts to exploit the vulnerability. Many organizations use pen testing as a means of increasing the security of their organizations; however, hackers also use pen testing as a means of finding networks and systems that they can exploit. As a result, every security expert must be sure to receive explicit authorization to perform pen testing before beginning the test. If such authorization is not obtained, a security expert could face dire consequences. Unauthorized pen testing is, in actuality, illegal—as it is a form of hacking. Vulnerability scanning vs. penetration testing.
  • 8. Page 8 – Penetration testing (pen testing). » The purpose is to assess the security of a system or network by actually using the same methods that a hacker would use to breach security. » The test can be used to verify that a threat exists. • Can also confirm that the threat doesn’t exist. » The test seeks to actively test and bypass any security controls that may be present. » It is designed to exploit any vulnerabilities that may be present on the system or network. » Unauthorized pen testing may lead to legal issues. Vulnerability scanning vs. penetration testing.
  • 9. Page 9 Vulnerability scanning vs. penetration testing.
  • 10. Page 10 It is vital that, when security tests are conducted on systems and networks, the testing be conducted at a variety of levels. The first level of security testing should be done at the white box level. White box testing is when the person conducting the test has the exact details of the system or network; the tester has intimate knowledge of what is present and how it is configured. The next level of security testing is done at the gray box level. With gray box testing, the tester has an intermediate knowledge of the how the system or network is configured. The final level of security testing is done at the black box level. With black box testing, the tester (usually a security expert) is given no prior knowledge of the configuration or what is present. Vulnerability scanning vs. penetration testing.
  • 11. Page 11 Vulnerability scanning vs. penetration testing. Vulnerability scanning is the passive collection of information on the configuration of systems and networks in an effort to determine how security might be improved. Penetration testing is using attack methods in an effort to breach security. The information gathered from pen testing is used to increase the security of systems and networks. The pen tester must have explicit permission to perform the testing, because without the permission it is actually an illegal action. Topic Vulnerability scanning and penetration testing. Summary To ensure a thorough assessment of security, testing should be conducted at different levels. The levels of testing should include: white box testing— the tester has intimate knowledge of the system or network, gray box testing—the tester has an intermediate knowledge of the system or network, and black box testing—the tester has no knowledge of the system or network. Levels of testing.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.