Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
What are the steps in the Penetration Test Methodology?
Recon / Scanning / Gaining Access / Maintaining Access / Covering Tracks
Conduct Assessment / Identify Exposures / Address Exposures
Recon / Enumeration / Vulnerability Analysis / Execution / Document Findings
From page 141 of the "Official ISC(2) Guide to the CISSP CBK", 4th edition, 2015
The "covering tracks" answer are the steps for Certified Ethical Hacking from EC Council. The "exposures" answer is the three phase cyclical vulnerability assessment procedure from SANS.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.