![[Featured Image] A group of cybersecurity professionals meet in a conference room to discuss creating a new penetration testing plan.](https://images.ctfassets.net/wp1lcwdav1p1/4W5OJp7Jg42SbCw2FAIfwi/1022d7667d3a69af16a24e0756f4b348/GettyImages-1626156976.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
Creating a Penetration Testing Plan: What You Need to Know Before Starting
Learn about penetration testing plans, including the stages of the planning process, different types of penetration tests, and careers where you can perform penetration tests.
December 6, 2024
Article

![[Featured Image] A college student uses different types of encryption on a laptop in a library.](https://images.ctfassets.net/wp1lcwdav1p1/7yzUitmzQUVJomZT3zEwOG/0917564dd191deeb25ff6167174302f7/GettyImages-143071328.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A computer networking professional is editing a program on the network server with edge computing.](https://images.ctfassets.net/wp1lcwdav1p1/7fS3BpxbLHCxeqsGb7TCZO/b51f9919ba7ec21d244e7253281ae0f7/GettyImages-597257862.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)



![[Featured Image] A man receiving a network technician salary is on a phone call while in a server room.](https://images.ctfassets.net/wp1lcwdav1p1/3kuUjXSm7hlA8yjGi0qRe/91f2494b50cc07e6d09dfd58149ccee1/GettyImages-1334004080.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A network analyst sits at a desk and uses a laptop to oversee their company's network operations.](https://images.ctfassets.net/wp1lcwdav1p1/7qGlLsEt2jUKBiE2v5101X/1f38d15c7fe5b2989cac78577db434a2/GettyImages-529793821.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A network technician is holding a laptop to troubleshoot a problem in a server room.](https://images.ctfassets.net/wp1lcwdav1p1/14vkez8hD7lVlmH3aiw57b/a519fb731a6d08eb79bdaa7de6c6d6cc/GettyImages-1334003865.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A network engineer explains Border Gateway Protocol to a new hire who will be working with the company’s internet data management team.](https://images.ctfassets.net/wp1lcwdav1p1/2OqCfKyjK2VSgnA3Gmlwrr/02f46a44d5e132f8b2dd36ece3c7503a/GettyImages-498573129.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A biologist holds a molecular model as he studies complex networks.](https://images.ctfassets.net/wp1lcwdav1p1/6SvyCYRyYD997CfPbUejnv/87f27911229b06bd1e6d599ec06f42cb/GettyImages-168166241.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] Two cybersecurity analysts sit in front of a computer monitor with code on the screen in a bright office.](https://images.ctfassets.net/wp1lcwdav1p1/17kv9Gt5hsV5GyPmTqJjix/c8085f74105e6fc4a6b362e34865ba2b/GettyImages-2028997753.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A network manager is at a computer in an office updating new software.](https://images.ctfassets.net/wp1lcwdav1p1/p6otI6BU33KaNZzuZOMUY/dd56f5a89990b86d24003d47a5e5a416/GettyImages-514408465.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] Two people work on computers, one on a laptop sitting on a couch in the background and the other on a desktop in the foreground, transmitting data online thanks in part to the transport layer.](https://images.ctfassets.net/wp1lcwdav1p1/6oGZd3R1jHRAHjwnYePlud/694551b5771fff6406c295429178d738/GettyImages-1313131469__1_.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A woman is working from her home office on a secure device, conducting a business meeting involving confidential information protected through a radius server.](https://images.ctfassets.net/wp1lcwdav1p1/4hmr7M7tEC3JAsnDf23vbI/d81ce7259eca4844b0472b51f4d479ed/GettyImages-1393600919.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
