Popular ISO 9001 Quality management > ISO 13485 Quality management for medical devices > ISO 14001 Environmental management > ISO 22301 Business continuity > ISO/IEC 27001 Information security > ISO 45001 (OHSAS 18001) Occupational health and safety > Energy management > ISO 50001 View all standards >
Access and buy standards How to access standards > Decide which option works best for your business Buy standards > Standards subscriptions > BSOL > Full standards collections Compliance Navigator > Medical device standards Eurocodes PLUS > Structural design standards BSI Membership > Services include knowledge centre, events and discounts
About standards What are standards? > Find out on how standards can help The role of BSI > UK Standards Organization, ISO, IEC, CEN, CENELEC, ETSI Get involved > Become a standards maker, join a committee
Standards and information Access and buy standards > Search our standards catalogue Develop a standard > Work with BSI to develop a standard Online subscription services > BSOL, Compliance Navigator, Eurocodes PLUS, BSI Membership and SCREEN Standards services >
Auditing, certification and training Assessment and ISO certification > ISO certification and others eg: IATF, FSSC Auditing and verification > Supplier audits, custom audits and internal audits Product testing and certification > BSI Kitemark, CE marking and verification, Market access solutions Validate BSI-issued certificates > Check company, site and product certificates
Training courses > Individual, group and company-wide training Medical devices services > CE marking for medical devices, MDR and IVDR, quality management for medical devices Compliance software and solutions > Software tools and solutions for governance, cyber security, risk and supply chain management
Consulting practices Cybersecurity and information resilience > Standards and standardization > Includes technical assistance, developing private standards, research and insight to form standards strategy and policies Supply chain management > View all BSI services >
Industry reports, research and news COVID-19 > Digital construction > BIM, smart cities and connected assets Future of mobility > Global market access > Health, safety and wellbeing > Information security > Cybersecurity, privacy (GDPR) and compliance
Blogs Built Environment > Cybersecurity and information resilience > Food Industry > Medical devices > Small Business > View all blogs >
About BSI > BSI impartiality > Our accreditation > Our clients and partners > Our financial information >
Our governance > Our legal information > Our Royal Charter > UK National Standards body > The global role of BSI as the national standards body
Careers > Events and conferences > Media centre > Sustainability > Modern slavery statement Contact us >
Security technology solutions > We partner with leading cloud security vendors Security testing > Vulnerability Assessment, Penetration Testing, Attack Simulation Third party security and risk assessment > Implement a robust information risk management framework
Virtual CISO > Find the right vCISO Business continuity consulting services > Make your business resilient to an ever changing and challenging world Incident management > Respond instantly to a data breach View all our cybersecurity services >
Data protection ( GDPR ) > Achieving and maintaining compliance with GDPR eDiscovery and Digital forensics > Understand and take control of your data Data subject requests (DSAR) support > Simplify, automate and reduce your response time for DSARs
DPO as a service > Quickly access to specialized, skilled and experienced consultants Article 27 Representation > Ensure your organization meets GDPR compliance obligations Data Protection Impact Assessment (DPIA) support > Minimize privacy and security risk View all our privacy and data protection solutions >
Certified information security courses > Get the skills you need to build resilience around information security management End user awareness and phishing simulations > Robust and compliant training courses
Social engineering > Recognize and avoid social engineering scams Online interactive solutions > Privacy and compliance education solutions View all our training courses >
PCI DSS > Discover our range of PCI DSS consultancy services Network and Information Systems Directive (NIS) > Achieve NIS compliance ISO/IEC 27001 consulting services > Identify and prioritize key risks across the organization
Cyber Lab (CAS, CPA, CTAS) > Carry out assessments against recognized NCSC schemes SOC 2 > Identify all services and solutions to be considered in-scope for the SOC report Internet of Things (IOT) > Enabling a smart and secure world View all our compliance services >
Lead Pen Test Professional training course Lead Pen Test Professional training enables you to develop the necessary expertise to lead a professional penetration test by using a mix of practical techniques and management skills. This course is designed by industry experts with in-depth experience in the penetration testing field. Unlike other trainings, this training course is focused specifically on the knowledge and skills needed by professionals looking to lead or take part in a penetration test. It drills down into the latest technical knowledge, tools and techniques in key areas including infrastructure, web application security, mobile security and social engineering. In addition, this course concentrates on how to practically apply what is learned on current day-to-day penetration testing and does not expand on unrelated, dated or unnecessary theoretical concepts. Along with the in-depth hands-on practical skills, this training course equips you with the management skills you need to lead a penetration test, taking into account business risks and key business issues. The individuals who complete the course have the right blend of the real business and technical competencies needed to be a respected, understood and professional penetration tester. On the last day of the training course, you will get to use the skills learned in a comprehensive capture and flag penetration testing exercises. Who should attend? IT professionals looking to enhance their technical skills and knowledge Auditors looking to understand the penetration testing processes IT and risk managers seeking a more detailed understanding of the appropriate and beneficial use of penetration tests Incident handlers and business continuity professionals looking to use testing as part of their testing regimes Penetration testers Ethical hackers Cybersecurity professionals What will I learn? Introduction to penetration testing, ethics, planning and scoping Technical foundation, knowledge and techniques (with practical exercises in all areas) Conducting a penetration test (using tools and techniques) and reviewing testing areas Analyzing results from testing, reporting and follow up How will I benefit? Learn how to interpret and illustrate the main penetration testing concepts and principles Understand the core technical knowledge needed to organize and carry out an effective set of pen tests Learn how to effectively plan a penetration Test and identify a scope which is suitable and appropriate based on risk Acquire hands-on practical skills and knowledge on relevant tools and techniques used to efficiently conduct a Penetration Testing Learn how to effectively manage the time and resources needed to scale a specific penetration test What's included? Lunch Refreshments Comprehensive course notes