Penetration testing can be used to evaluate a wide range of security controls, including network and network device configurations, application security, and endpoint security.
Penetration testing, also known as “pen testing” or “ethical hacking,” is the practice of testing the security of a computer system, network, or web application by simulating an attack from a malicious actor.