-
Notifications
You must be signed in to change notification settings - Fork 29
/
Copy pathPenetration_Tester.php
144 lines (113 loc) · 6.67 KB
/
Penetration_Tester.php
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
<?php
// Initialize the session
session_start();
?>
<!DOCTYPE html>
<html lang="en">
<?php include 'header.php'?>
<!-- Hero-area -->
<div class="hero-area section">
<!-- Backgound Image -->
<div class="bg-image bg-parallax overlay" style="background-image:url(./img/bgc2.jpg); " ></div>
<!-- /Backgound Image -->
<div class="container">
<div class="row">
<div class="col-md-10 col-md-offset-1 text-center">
<ul class="hero-area-tree">
<li><a href="main.php">Home</a></li>
<li><a href="blog.php">Knowledge Network</a></li>
<li>Penetration Tester</li>
</ul>
<h1 class="white-text">Penetration Tester</h1>
</div>
</div>
</div>
</div>
<!-- /Hero-area -->
<!-- Blog -->
<div id="blog" class="section">
<!-- container -->
<div class="container">
<!-- row -->
<div class="row">
<!-- main blog -->
<div id="main" class="col-md-9">
<!-- blog post -->
<div class="blog-post" style= "text-align:justify; ">
<h2>Job Description</h2>
<!-- row -->
<div class="row">
<p style="font-size:16px;" >Penetration testers, also known as “ethical hackers,” are highly skilled security specialists that spend their days attempting to breach computer and network security systems. These testers work in the information technology (IT) field to ensure that those without authorization cannot access an organization’s data. They do this by trying to hack into networks to identify potential vulnerabilities in the system. </p>
<p style="font-size:16px;">Penetration testers help businesses and organizations identify and resolve security vulnerabilities and weaknesses affecting their digital assets and computer networks. Some hold in-house positions with permanent employers, functioning as part of internal cybersecurity or information technology (IT) teams. Others work for specialized firms that provide penetration-testing services to end clients.</p>
<p style="font-size:16px;"></p>
</div>
<!-- /row -->
<!-- row -->
<div class="row">
<h2>Skills required</h2>
<ol style="font-size:16px;">
<li><b>1. </b>Coding skill required to infiltrate any system.</li>
<li><b>2. </b>Comprehensive knowledge of computer security, including forensics, systems analysis and more.</li>
<li><b>3. </b>Insight into how hackers exploit the human element to gain unauthorized access to secure systems.</li>
<li><b>4. </b>Clear understanding of how computer security breaches can disrupt business, including the financial and managerial implications.</li>
<li><b>5. </b>Exceptional problem-solving skills.</li>
<li><b>6. </b>Communications skills to document and share your findings.</li>
</ol>
</div>
<!-- /row -->
<!-- row -->
<div class="row">
<h2>Educational Requirements</h2>
<p style="font-size:16px;"> Bachelor’s or Master’s degree in computer science, IT, cybersecurity, or a related specialization. Knowledge of SQL, C++, JavaScript, Ruby and Python</p>
</div>
<!-- /row -->
<!-- row -->
<div class="row">
<h2>Duties and Responsibilities</h2>
<p style="font-size:16px;">Penetration Tester job will likely also involve planning and executing tests, documenting your methodologies, creating detailed reports about your findings and perhaps also being involved in designing fixes and improving security protocols.</p>
<ol style="font-size:16px;">
<li><b>1. </b>Perform penetration tests on computer systems, networks and applications.</li>
<li><b>2. </b>Create new testing methods to identify vulnerabilities.</li>
<li><b>3. </b>Perform physical security assessments of systems, servers and other network devices to identify areas that require physical protection.</li>
<li><b>4. </b>Pinpoint methods and entry points that attackers may use to exploit vulnerabilities or weaknesses.</li>
<li><b>5. </b>Search for weaknesses in common software, web applications and proprietary systems.</li>
<li><b>6. </b>Research, evaluate, document and discuss findings with IT teams and management.</li>
<li><b>7. </b>Review and provide feedback for information security fixes.</li>
<li><b>8. </b>Establish improvements for existing security services, including hardware, software, policies and procedures.</li>
<li><b>9. </b>Identify areas where improvement is needed in security education and awareness for users.</li>
</ol>
</div>
<!-- /row -->
<!-- row -->
<div class="row">
<h2>Salary</h2>
<p style="font-size:16px;">The average salary for a Penetration Tester in India is Rs. 603062 per annum.</p>
</div>
<!-- /row -->
<!-- row -->
<div class="row">
<h2>Companies offering Penetration Tester role</h2>
<ol style="font-size:16px;">
<li><b>1. Bank of America </b> </li>
<li><b>2. JP Morgan Chase </b></li>
<li><b>3. Amazon</b></li>
<li><b>4. IBM</b></li>
<li><b>5. Dell</b></li>
<li><b>6. Sony</b></li>
<li><b>7. Ebay</b></li>
<li><b>8. Deloitte</b></li>
</ol>
</div>
<!-- /row -->
</div>
<!-- /blog post -->
</div>
<!-- /main blog -->
</div>
<!-- row -->
</div>
<!-- container -->
</div>
<!-- /Blog -->
<?php include 'footer.php'?>
</html>