During the course of this chapter, we discussed the different types of hackers while outlining their primary characteristics. The various types of penetration tests and phases were covered, including an exploration of popular testing methodologies and approaches used in the cybersecurity industry.
You are now able to compare and contrast the different types of hackers. You have gained knowledge and understanding of various terms used within the cybersecurity industry, and you have got to grips with the importance of and different phases of penetration testing. You are able to distinguish between various types of penetration testing, such as network, web, and even cloud penetration testing.
In Chapter 2, Setting Up Kali - Part 1, and Chapter 3, Setting Up Kali - Part 2, we will be covering the steps involved in setting up your own virtual penetration testing lab for practicing...