CompTIA PenTest+
1 Threats, Attacks, and Vulnerabilities
1-1 Common Threat Actors
1-2 Threat Intelligence Sources
1-3 Threat Actors and Motives
1-4 Threat Actor Tactics, Techniques, and Procedures (TTPs)
1-5 Vulnerability Types
1-6 Exploit Types
1-7 Attack Types
1-8 Threat Detection and Monitoring
1-9 Threat Hunting
1-10 Incident Response
2 Architecture and Design
2-1 Security Controls
2-2 Network Architecture
2-3 Cloud and Virtualization
2-4 Web Application Security
2-5 Wireless Security
2-6 Mobile Security
2-7 IoT Security
2-8 Industrial Control Systems (ICS) Security
2-9 Physical Security
2-10 Secure Software Development
3 Tools and Code
3-1 Penetration Testing Tools
3-2 Exploitation Tools
3-3 Post-Exploitation Tools
3-4 Reporting Tools
3-5 Scripting and Automation
3-6 Programming Languages
3-7 Code Analysis
3-8 Open Source Intelligence (OSINT) Tools
4 Planning and Scoping
4-1 Penetration Testing Methodologies
4-2 Legal and Compliance Considerations
4-3 Scope Definition
4-4 Risk Assessment
4-5 Threat Modeling
4-6 Information Gathering
4-7 Asset Identification
4-8 Data Classification
4-9 Business Impact Analysis
4-10 Penetration Testing Objectives
5 Information Gathering and Vulnerability Identification
5-1 Passive Reconnaissance
5-2 Active Reconnaissance
5-3 Vulnerability Scanning
5-4 Network Mapping
5-5 Service Identification
5-6 Web Application Scanning
5-7 Wireless Network Scanning
5-8 Social Engineering Techniques
5-9 OSINT Techniques
5-10 Vulnerability Databases
6 Attacks and Exploits
6-1 Exploit Development
6-2 Buffer Overflows
6-3 SQL Injection
6-4 Cross-Site Scripting (XSS)
6-5 Cross-Site Request Forgery (CSRF)
6-6 Command Injection
6-7 Privilege Escalation
6-8 Lateral Movement
6-9 Evasion Techniques
6-10 Exploit Delivery Methods
7 Penetration Testing Process
7-1 Pre-Engagement Activities
7-2 Reconnaissance
7-3 Scanning and Enumeration
7-4 Exploitation
7-5 Post-Exploitation
7-6 Reporting
7-7 Remediation
7-8 Retesting
7-9 Documentation and Evidence Collection
7-10 Communication and Coordination
8 Reporting and Communication
8-1 Report Structure
8-2 Executive Summary
8-3 Technical Findings
8-4 Risk Assessment
8-5 Remediation Recommendations
8-6 Legal and Compliance Considerations
8-7 Presentation Skills
8-8 Communication with Stakeholders
8-9 Documentation Standards
8-10 Continuous Improvement
9 Security and Compliance
9-1 Regulatory Requirements
9-2 Industry Standards
9-3 Compliance Audits
9-4 Data Protection
9-5 Privacy Laws
9-6 Incident Response Planning
9-7 Disaster Recovery Planning
9-8 Business Continuity Planning
9-9 Risk Management
9-10 Security Awareness Training
8.4 Risk Assessment Explained

8.4 Risk Assessment Explained

Key Concepts

1. Risk Identification

Risk Identification involves recognizing and listing potential threats and vulnerabilities that could impact the security of a system or network. This includes understanding the nature of the risks and their sources.

2. Risk Analysis

Risk Analysis is the process of evaluating identified risks to determine their potential impact and likelihood. This helps in prioritizing risks based on their severity and probability of occurrence.

3. Risk Evaluation

Risk Evaluation compares the results of the risk analysis against predefined criteria to decide whether the risks are acceptable or require mitigation. This involves assessing the cost and feasibility of different risk treatment options.

4. Risk Treatment

Risk Treatment involves selecting and implementing measures to manage identified risks. This can include avoiding the risk, reducing the risk, transferring the risk, or accepting the risk.

5. Risk Monitoring and Review

Risk Monitoring and Review involves continuously tracking and reviewing the effectiveness of risk treatment measures. This ensures that risks remain within acceptable levels and that new risks are identified and addressed.

Explanation of Concepts

Risk Identification

Risk Identification is the first step in the risk assessment process. For example, a penetration tester might identify vulnerabilities such as outdated software, weak passwords, and unpatched systems. Understanding these risks helps in planning the necessary security measures.

Risk Analysis

Risk Analysis involves evaluating the identified risks to determine their potential impact and likelihood. For instance, a vulnerability in a critical system might have a high impact but a low likelihood of being exploited, while a common vulnerability in a widely used software might have a high likelihood of exploitation but a moderate impact.

Risk Evaluation

Risk Evaluation compares the analyzed risks against predefined criteria to decide their acceptability. For example, a risk with a high impact and high likelihood might be deemed unacceptable, while a risk with a low impact and low likelihood might be considered acceptable with minimal mitigation.

Risk Treatment

Risk Treatment involves selecting and implementing measures to manage identified risks. For example, a company might choose to avoid a high-risk activity, reduce the risk by implementing security controls, transfer the risk by purchasing insurance, or accept the risk if the cost of mitigation is too high.

Risk Monitoring and Review

Risk Monitoring and Review ensures that risk treatment measures remain effective over time. For example, a company might regularly review its security controls to ensure they are up-to-date and effective, and monitor for new risks that may emerge due to changes in the environment or technology.

Examples and Analogies

Risk Identification

Consider Risk Identification as a home inspection. Just as a home inspector identifies potential issues such as leaks, electrical hazards, and structural weaknesses, a penetration tester identifies potential security risks in a system or network.

Risk Analysis

Think of Risk Analysis as evaluating the severity of a medical condition. Just as a doctor assesses the impact and likelihood of a disease, a penetration tester evaluates the impact and likelihood of identified risks.

Risk Evaluation

Risk Evaluation can be compared to deciding whether to undergo surgery. Just as a patient and doctor weigh the risks and benefits of surgery, a company evaluates the risks and decides whether to accept them or take action to mitigate them.

Risk Treatment

Consider Risk Treatment as choosing a treatment plan for a medical condition. Just as a doctor might recommend medication, therapy, or surgery, a company might choose to avoid, reduce, transfer, or accept a risk.

Risk Monitoring and Review

Think of Risk Monitoring and Review as regular health check-ups. Just as a patient regularly monitors their health and reviews treatment plans, a company continuously monitors and reviews its risk management strategies.