![[Featured Image] A group of cybersecurity professionals meet in a conference room to discuss creating a new penetration testing plan.](https://images.ctfassets.net/wp1lcwdav1p1/4W5OJp7Jg42SbCw2FAIfwi/1022d7667d3a69af16a24e0756f4b348/GettyImages-1626156976.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
Creating a Penetration Testing Plan: What You Need to Know Before Starting
Learn about penetration testing plans, including the stages of the planning process, different types of penetration tests, and careers where you can perform penetration tests.
December 5, 2024
Article

![[Featured Image] A college student uses different types of encryption on a laptop in a library.](https://images.ctfassets.net/wp1lcwdav1p1/7yzUitmzQUVJomZT3zEwOG/0917564dd191deeb25ff6167174302f7/GettyImages-143071328.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A person working for an IT manager salary sits in front of his laptop in an office space.](https://images.ctfassets.net/wp1lcwdav1p1/4Ec7eiF5rRH6HLeSt9tLix/6186a802c56984820db4c6ebdc84c62b/GettyImages-1352887748.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)



![[Featured Image] A computer networking professional is editing a program on the network server with edge computing.](https://images.ctfassets.net/wp1lcwdav1p1/7fS3BpxbLHCxeqsGb7TCZO/b51f9919ba7ec21d244e7253281ae0f7/GettyImages-597257862.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)

![[Featured Image] A man receiving a network technician salary is on a phone call while in a server room.](https://images.ctfassets.net/wp1lcwdav1p1/3kuUjXSm7hlA8yjGi0qRe/91f2494b50cc07e6d09dfd58149ccee1/GettyImages-1334004080.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A group of IT professionals join a virtual meeting to discuss their company's information technology service management (ITSM) plan.](https://images.ctfassets.net/wp1lcwdav1p1/76mng5gqVZbRJO6H55bfVw/be150a870f68c773d9cfeeff7bc15fa6/GettyImages-1367318737.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A network analyst sits at a desk and uses a laptop to oversee their company's network operations.](https://images.ctfassets.net/wp1lcwdav1p1/7qGlLsEt2jUKBiE2v5101X/1f38d15c7fe5b2989cac78577db434a2/GettyImages-529793821.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A network technician is holding a laptop to troubleshoot a problem in a server room.](https://images.ctfassets.net/wp1lcwdav1p1/14vkez8hD7lVlmH3aiw57b/a519fb731a6d08eb79bdaa7de6c6d6cc/GettyImages-1334003865.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A network engineer explains Border Gateway Protocol to a new hire who will be working with the company’s internet data management team.](https://images.ctfassets.net/wp1lcwdav1p1/2OqCfKyjK2VSgnA3Gmlwrr/02f46a44d5e132f8b2dd36ece3c7503a/GettyImages-498573129.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A biologist holds a molecular model as he studies complex networks.](https://images.ctfassets.net/wp1lcwdav1p1/6SvyCYRyYD997CfPbUejnv/87f27911229b06bd1e6d599ec06f42cb/GettyImages-168166241.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] An IT support specialist in a blue shirt stands in front of a laptop in a brightly lit office. A co-worker sits in the background.](https://downloads.ctfassets.net/wp1lcwdav1p1/3bUbeoPqqkYNJtQaxWjsBR/904e48f81b6fc314a7b02ce71388dcf5/GettyImages-2150798689.jpg)
