There's not an only way but here's a good one
We offer a guide to become an ethical hacker based off some information on common non-technical and technical skills hackers find useful for their role.
Description and critique of CEH certifications
Here's a description and a critique of the CEH founded on the question, "Should the person who has this certification be called a 'certified ethical hacker'?"
An OffSec Experienced Pentester review
In this post, we review the PEN-300 course and OSEP certification offered by OffSec.
Or what makes the ethical hacker
If ethical hackers can do everything cybercriminals do, what is keeping them from wrongdoing? Let's see how they differ and how that shows in codes of ethics.
O lo que hace al hacker ético
Si los hackers éticos pueden hacer todo lo que hacen los ciberdelincuentes, ¿qué les impide obrar mal? Veamos en qué se diferencian y cómo eso se manifiesta en los códigos de ética.
Recognize the value of this security assessment method
We took as a basis a question from Tribe of Hackers Red Team (2019) aimed at explaining the value of red teaming to those who're reluctant or unaware of it.
Differences between these security testing approaches
There is confusion around the differences between breach and attack simulation, penetration testing and red teaming. Read this blog post for a clear comparison.
Diferencias entre tres enfoques de pruebas de seguridad
Hay confusión sobre las diferencias entre breach and attack simulation, pentesting y red teaming. En esta entrada de blog encuentras una comparación clara.
How BAS solutions work, their importance and benefits
Learn about what breach and attack simulation is, how it works, its role in security testing, and its benefits for defending against advanced threats.