{"id":82468,"date":"2024-11-20T12:26:00","date_gmt":"2024-11-20T12:26:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82468"},"modified":"2024-11-28T05:27:19","modified_gmt":"2024-11-28T05:27:19","slug":"guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/","title":{"rendered":"Guide to Penetration Testing: Navigating the Legal and Ethical Landscape\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82468\" class=\"elementor elementor-82468\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3702b53 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3702b53\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d6fcd0\" data-id=\"7d6fcd0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d6d0593 elementor-widget elementor-widget-text-editor\" data-id=\"d6d0593\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date: <\/strong>November 20, 2024<br>\n<strong>Time:<\/strong> 6:30 AM MST | 8:30 AM EST | 7:00 PM IST<br>\n<strong>Topic:<\/strong> Guide to Penetration Testing: Navigating the Legal and Ethical Landscape<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong>&nbsp;<\/strong><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> With organizations expanding their digital presence globally, compliance for data protection is becoming increasingly important. Through the proactive penetration testing approach, vulnerabilities within these data systems can be identified and fixed even before malicious actors can exploit them. However, the scope and limitation of pen testing capabilities are strictly regulated by ethical and legal considerations. As part of the series \u2018Guide to Penetration Testing,\u2019 this webinar explores the challenges and practices associated with legal and ethical aspects that penetration testers need to consider. From understanding the legal frameworks that govern penetration testing to authorization and disclosure, the webinar will discuss the approach to maintaining systems and data integrity and avoiding legal pitfalls. Additionally, it aims to equip security professionals, pen testers, and ethical hackers with the knowledge needed to conduct penetration tests responsibly and legally. Attendees will also gain valuable guidance to help them perform penetration tests that strengthen security and uphold the highest standards of legal and ethical responsibility.<\/span><\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Understanding how to define methodologies and the scope of penetration testing<\/li>\n<li>Developing and integrating a legal framework to govern penetration testing<\/li>\n<li>Best practices for ethically conducting a penetration test<\/li>\n<li>Common legal pitfalls to avoid while conducting a penetration test<\/li>\n<li>Balancing holistic security and authorization via pentesting<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/08\/Rodney-Gullatte-Jr.png\" alt=\"Rodney Gullatte, Jr.\" width=\"200\"><strong>Rodney Gullatte, Jr.<\/strong>, Certified Ethical Hacker and CEO of Firma IT Solutions<\/p>\n<p><strong>Bio:<\/strong> Rodney Gullatte, Jr., is a community leader, US Air Force veteran, certified ethical hacker, certified chief information security officer, certified network defense architect, and has another 13 certifications. He is the CEO of Firma IT Solutions, which provides penetration testing facilities for private companies that currently have internal IT\/Cyber support or are outsourcing their IT\/Cyber services. With a background in information technology and cybersecurity that includes the Department of Defense, retail, healthcare, casinos, utility companies, and more, Rodney has developed Firma IT Solutions to bring this enterprise pen testing service to businesses in the Pikes Peak Region and across the World, Colorado Springs, CO, is his 5th community as a military family. In the short span of 9 years, Rodney established himself in Colorado Springs as a transformational business and community leader. His latest accomplishments are becoming the first Black President of the Rotary Club of Colorado Springs (2020-2021), winner of Colorado Springs Business Journal Best in Business 2017 and 2023 #1 Cybersecurity Company, recipient of the Colorado Springs Business Journal Rising Stars Class of 2018 award, winner of the 2020 Mayor\u2019s Young Leaders Award in Technology and Sustainability, winner of the 2020 Front Range Power Connectors Networker of the Year, founder of the Colorado Springs Black Business Network and the winner of Small Business Week 2019 Veteran Business Owner of the Year. He is the immediate past President &amp; CEO of the Colorado Springs Black Chamber of Commerce. He serves on the board of directors for the Colorado Springs Chamber and EDC, the Cultural Office of the Pikes Peak Region, and the National Cybersecurity Center. He is an alumnus of the inaugural Colorado Springs Mayor\u2019s Civic Leaders Fellowship, Colorado Governor\u2019s Fellowship Class of 2022, and Colorado Springs Leadership Institute Class of 2019. He is currently an Honorary Commander of the US Air Force Academy. He is one of 50 people globally to be honored as a 2023 EC-Council Chief Information Security Officer Hall of Fame Award Winner.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<a name=\"attend\"><\/a>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/M2QRMWwLH4w?si=J5pm4iaIYXr2o29Y\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: November 20, 2024 Time: 6:30 AM MST | 8:30 AM EST | 7:00 PM IST Topic: Guide to Penetration Testing: Navigating the Legal and Ethical Landscape Register &nbsp;Abstract: With organizations expanding their digital presence globally, compliance for data protection is becoming increasingly important. Through the proactive penetration testing approach, vulnerabilities within these data systems&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82469,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82468","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Legal and Ethical Side of Penetration Testing: A Comprehensive Guide<\/title>\n<meta name=\"description\" content=\"Learn how to navigate the legal and ethical complexities of penetration testing, pitfalls, best practices, and key considerations for conducting secure tests.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guide to Penetration Testing: Navigating the Legal and Ethical Landscape\u00a0\" \/>\n<meta property=\"og:description\" content=\"Learn how to navigate the legal and ethical complexities of penetration testing, pitfalls, best practices, and key considerations for conducting secure tests.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-20T12:26:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-28T05:27:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-30.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1396\" \/>\n\t<meta property=\"og:image:height\" content=\"930\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"Guide to Penetration Testing: Navigating the Legal and Ethical Landscape\u00a0\",\"datePublished\":\"2024-11-20T12:26:00+00:00\",\"dateModified\":\"2024-11-28T05:27:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\\\/\"},\"wordCount\":596,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/465-310-1-30.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\\\/\",\"name\":\"The Legal and Ethical Side of Penetration Testing: A Comprehensive Guide\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/465-310-1-30.png\",\"datePublished\":\"2024-11-20T12:26:00+00:00\",\"dateModified\":\"2024-11-28T05:27:19+00:00\",\"description\":\"Learn how to navigate the legal and ethical complexities of penetration testing, pitfalls, best practices, and key considerations for conducting secure tests.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/465-310-1-30.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/465-310-1-30.png\",\"width\":1396,\"height\":930},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Guide to Penetration Testing: Navigating the Legal and Ethical Landscape\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Legal and Ethical Side of Penetration Testing: A Comprehensive Guide","description":"Learn how to navigate the legal and ethical complexities of penetration testing, pitfalls, best practices, and key considerations for conducting secure tests.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/","og_locale":"en_US","og_type":"article","og_title":"Guide to Penetration Testing: Navigating the Legal and Ethical Landscape\u00a0","og_description":"Learn how to navigate the legal and ethical complexities of penetration testing, pitfalls, best practices, and key considerations for conducting secure tests.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-11-20T12:26:00+00:00","article_modified_time":"2024-11-28T05:27:19+00:00","og_image":[{"width":1396,"height":930,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-30.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"Guide to Penetration Testing: Navigating the Legal and Ethical Landscape\u00a0","datePublished":"2024-11-20T12:26:00+00:00","dateModified":"2024-11-28T05:27:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/"},"wordCount":596,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-30.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/","name":"The Legal and Ethical Side of Penetration Testing: A Comprehensive Guide","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-30.png","datePublished":"2024-11-20T12:26:00+00:00","dateModified":"2024-11-28T05:27:19+00:00","description":"Learn how to navigate the legal and ethical complexities of penetration testing, pitfalls, best practices, and key considerations for conducting secure tests.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-30.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-30.png","width":1396,"height":930},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-navigating-the-legal-and-ethical-landscape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Guide to Penetration Testing: Navigating the Legal and Ethical Landscape\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82468"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82468\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82469"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}