Protecting Penetration Test Data
Encryption Schemas
Data Encryption
Data Hashing
Securing Pentest Systems
Encrypt the hard drive
Lock hard drives in a safe
Store systems in a physically controlled room
Perform penetration tests against the pentest systems
Mobile Security Concerns
Wireless Lab Data
two separate labs should be created
a wireless lab designed to practice wireless hacking
a separate lab that can be used to conduct system attacks