{"id":173,"date":"2011-01-10T21:49:50","date_gmt":"2011-01-10T20:49:50","guid":{"rendered":"https:\/\/thebc.ch\/blog\/?p=173"},"modified":"2013-02-01T13:18:26","modified_gmt":"2013-02-01T12:18:26","slug":"penetration-testing-best-practice","status":"publish","type":"post","link":"https:\/\/thebc.ch\/blog\/?p=173","title":{"rendered":"Penetration Testing best practice"},"content":{"rendered":"<span id=\"Testing_Methodologies\"><h2>Testing Methodologies<\/h2><\/span>\n<ul>\n<li><a title=\"http:\/\/www.owasp.org\" href=\"http:\/\/www.owasp.org\/\" rel=\"nofollow\">OWASP<\/a> &#8211; Open Web Application Security Project<\/li>\n<li><a title=\"http:\/\/www.osstmm.org\" href=\"http:\/\/www.osstmm.org\/\" rel=\"nofollow\">OSSTMM<\/a> &#8211; Open Source Security Testing Methodology Manual<\/li>\n<li><a title=\"http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-42\/NIST-SP800-42.pdf\" href=\"http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-42\/NIST-SP800-42.pdf\" rel=\"nofollow\">NIST SP 800-42<\/a><\/li>\n<li><a title=\"http:\/\/www.cccure.org\/\" href=\"http:\/\/www.cccure.org\/\" rel=\"nofollow\">CISSP<\/a> and SSCP Open Study Guides Web Site<\/li>\n<li><a title=\"http:\/\/www.professionalsecuritytesters.org\" href=\"http:\/\/www.professionalsecuritytesters.org\/\" rel=\"nofollow\">The Professional Security Testers Warehouse<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<span id=\"Certifications\"><h2>Certifications<\/h2><\/span>\n<ul>\n<li><a title=\"http:\/\/www.isecom.org\/projects\/opsa.shtml\" href=\"http:\/\/www.isecom.org\/projects\/opsa.shtml\" rel=\"nofollow\">OPSA<\/a> &#8211; OSSTMM Professional Security Analyst<\/li>\n<li><a title=\"http:\/\/www.isecom.org\/projects\/opst.shtml\" href=\"http:\/\/www.isecom.org\/projects\/opst.shtml\" rel=\"nofollow\">OPST<\/a> &#8211; OSSTMM Professional Security Tester<\/li>\n<li><a title=\"https:\/\/www.isc2.org\/cgi-bin\/content.cgi?category=1332\" href=\"https:\/\/www.isc2.org\/cgi-bin\/content.cgi?category=1332\" rel=\"nofollow\">SSCP<\/a> &#8211; Systems Security Certified Practitioner<\/li>\n<li><a title=\"https:\/\/www.isc2.org\/cgi-bin\/content.cgi?category=1331\" href=\"https:\/\/www.isc2.org\/cgi-bin\/content.cgi?category=1331\" rel=\"nofollow\">CISSP<\/a> &#8211; Certified Information Systems Security Professional<\/li>\n<li><a title=\"http:\/\/www.eccouncil.org\/CEH.htm\" href=\"http:\/\/www.eccouncil.org\/CEH.htm\" rel=\"nofollow\">CEH<\/a> &#8211; Certified Ethical Hacker Certificate<\/li>\n<li><a title=\"http:\/\/www.eccouncil.org\/CHFI.htm\" href=\"http:\/\/www.eccouncil.org\/CHFI.htm\" rel=\"nofollow\">CHFI<\/a> &#8211; Computer Hacking Forensic Investigator<\/li>\n<li><a title=\"http:\/\/www.eccouncil.org\/lpt\/Licensed_Penetration_Tester.htm\" href=\"http:\/\/www.eccouncil.org\/lpt\/Licensed_Penetration_Tester.htm\" rel=\"nofollow\">LPT<\/a> &#8211; Licensed Penetration Terster Certificate<\/li>\n<li><a title=\"http:\/\/www.eccouncil.org\/ecsa\/index.htm\" href=\"http:\/\/www.eccouncil.org\/ecsa\/index.htm\" rel=\"nofollow\">ESCA<\/a> &#8211; EC-Council Certified Security Analyst<\/li>\n<li><a title=\"http:\/\/www.eccouncil.org\/ecsp\/index.htm\" href=\"http:\/\/www.eccouncil.org\/ecsp\/index.htm\" rel=\"nofollow\">ECSP\/CSAD<\/a> &#8211; EC-Council Certified Secure Programmer<\/li>\n<li><a title=\"http:\/\/www.cisco.com\/web\/learning\/le3\/le2\/le0\/le9\/learning_certification_type_home.html\" href=\"http:\/\/www.cisco.com\/web\/learning\/le3\/le2\/le0\/le9\/learning_certification_type_home.html\" rel=\"nofollow\">CCNA<\/a> &#8211; Cisco Certified Network Associate<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Testing Methodologies OWASP &#8211; Open Web Application Security Project OSSTMM &#8211; Open Source Security Testing Methodology Manual NIST SP 800-42 CISSP and SSCP Open Study Guides Web Site The Professional Security Testers Warehouse &nbsp; Certifications OPSA &#8211; OSSTMM Professional Security &hellip; <a href=\"https:\/\/thebc.ch\/blog\/?p=173\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-173","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=\/wp\/v2\/posts\/173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=173"}],"version-history":[{"count":6,"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=\/wp\/v2\/posts\/173\/revisions"}],"predecessor-version":[{"id":2742,"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=\/wp\/v2\/posts\/173\/revisions\/2742"}],"wp:attachment":[{"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}