{"id":42,"date":"2023-05-16T20:33:59","date_gmt":"2023-05-16T20:33:59","guid":{"rendered":"https:\/\/pensec.tech\/?page_id=42"},"modified":"2023-05-16T20:56:37","modified_gmt":"2023-05-16T20:56:37","slug":"penetration-testing","status":"publish","type":"page","link":"https:\/\/pensec.tech\/penetration-testing\/","title":{"rendered":"Penetration Testing"},"content":{"rendered":"\n

The services we offer include application security testing, network security testing, and social engineering testing. We also provide vulnerability management services and penetration testing consulting. Our team has extensive experience in helping organizations protect their digital assets and ensure their cybersecurity posture. Our services are designed to meet government, industry, and regulatory compliance standards. We strive to provide proactive and cost-effective solutions that deliver measurable value to our clients.<\/p>\n","protected":false},"excerpt":{"rendered":"

The services we offer include application security testing, network security testing, and social engineering testing. We also provide vulnerability management services and penetration testing consulting. Our team has extensive experience in helping organizations protect their digital assets and ensure their cybersecurity posture. Our services are designed to meet government, industry, and regulatory compliance standards. We […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"\nPenetration Testing - PST<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pensec.tech\/penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Penetration Testing - PST\" \/>\n<meta property=\"og:description\" content=\"The services we offer include application security testing, network security testing, and social engineering testing. We also provide vulnerability management services and penetration testing consulting. Our team has extensive experience in helping organizations protect their digital assets and ensure their cybersecurity posture. Our services are designed to meet government, industry, and regulatory compliance standards. We […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pensec.tech\/penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"PST\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T20:56:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pensec.tech\/wp-content\/uploads\/2023\/05\/PSTLogoNew1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"428\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pensec.tech\/penetration-testing\/\",\"url\":\"https:\/\/pensec.tech\/penetration-testing\/\",\"name\":\"Penetration Testing - PST\",\"isPartOf\":{\"@id\":\"https:\/\/pensec.tech\/#website\"},\"datePublished\":\"2023-05-16T20:33:59+00:00\",\"dateModified\":\"2023-05-16T20:56:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/pensec.tech\/penetration-testing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pensec.tech\/penetration-testing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pensec.tech\/penetration-testing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/pensec.tech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Penetration Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pensec.tech\/#website\",\"url\":\"https:\/\/pensec.tech\/\",\"name\":\"PST\",\"description\":\"PenSecTech\",\"publisher\":{\"@id\":\"https:\/\/pensec.tech\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pensec.tech\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pensec.tech\/#organization\",\"name\":\"PST\",\"url\":\"https:\/\/pensec.tech\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pensec.tech\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pensec.tech\/wp-content\/uploads\/2023\/05\/cropped-PSTLogoNew1.png\",\"contentUrl\":\"https:\/\/pensec.tech\/wp-content\/uploads\/2023\/05\/cropped-PSTLogoNew1.png\",\"width\":512,\"height\":512,\"caption\":\"PST\"},\"image\":{\"@id\":\"https:\/\/pensec.tech\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Penetration Testing - PST","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pensec.tech\/penetration-testing\/","og_locale":"en_US","og_type":"article","og_title":"Penetration Testing - PST","og_description":"The services we offer include application security testing, network security testing, and social engineering testing. We also provide vulnerability management services and penetration testing consulting. Our team has extensive experience in helping organizations protect their digital assets and ensure their cybersecurity posture. Our services are designed to meet government, industry, and regulatory compliance standards. We […]","og_url":"https:\/\/pensec.tech\/penetration-testing\/","og_site_name":"PST","article_modified_time":"2023-05-16T20:56:37+00:00","og_image":[{"width":650,"height":428,"url":"https:\/\/pensec.tech\/wp-content\/uploads\/2023\/05\/PSTLogoNew1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pensec.tech\/penetration-testing\/","url":"https:\/\/pensec.tech\/penetration-testing\/","name":"Penetration Testing - PST","isPartOf":{"@id":"https:\/\/pensec.tech\/#website"},"datePublished":"2023-05-16T20:33:59+00:00","dateModified":"2023-05-16T20:56:37+00:00","breadcrumb":{"@id":"https:\/\/pensec.tech\/penetration-testing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pensec.tech\/penetration-testing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pensec.tech\/penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pensec.tech\/"},{"@type":"ListItem","position":2,"name":"Penetration Testing"}]},{"@type":"WebSite","@id":"https:\/\/pensec.tech\/#website","url":"https:\/\/pensec.tech\/","name":"PST","description":"PenSecTech","publisher":{"@id":"https:\/\/pensec.tech\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pensec.tech\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pensec.tech\/#organization","name":"PST","url":"https:\/\/pensec.tech\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pensec.tech\/#\/schema\/logo\/image\/","url":"https:\/\/pensec.tech\/wp-content\/uploads\/2023\/05\/cropped-PSTLogoNew1.png","contentUrl":"https:\/\/pensec.tech\/wp-content\/uploads\/2023\/05\/cropped-PSTLogoNew1.png","width":512,"height":512,"caption":"PST"},"image":{"@id":"https:\/\/pensec.tech\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/pages\/42"}],"collection":[{"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/comments?post=42"}],"version-history":[{"count":5,"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/pages\/42\/revisions"}],"predecessor-version":[{"id":73,"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/pages\/42\/revisions\/73"}],"wp:attachment":[{"href":"https:\/\/pensec.tech\/wp-json\/wp\/v2\/media?parent=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}