How ethical hackers use penetration testing to simulate attacks Assessing the tools, steps, and methods for finding vulnerabilities before the bad guys do.