Skip to Main Content
Strengthen your email security practices with 50% off e-learning | Shop now
Infrastructure (Network) Penetration Test

Infrastructure (Network) Penetration Test

SKU: 3184
Format: Consultancy

Identify your network’s critical vulnerabilities before cyber criminals do.

This infrastructure penetration test provides a complete solution for effectively testing your IT network infrastructure and ensuring that your organisation is genuinely secure against a range of constantly evolving cyber threats.

This test can be used to help meet the requirements of the PCI DSS and ISO 27001. 

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account.  Apply online today or call our service centre team on 00 800 48 484 484.

 COVID-19: remote delivery options

We would like to reassure our clients that all training and consultancy services will go ahead as scheduled during the current COVID-19 situation. As a company that fully embraces flexible and remote working, we are adjusting our delivery methods to allow us to provide consultancy services, penetration tests and training remotely where necessary. Please also refer to our COVID-19 policy.

For more information about this service or to get a tailored quote for your organisation, please enquire below and one of our experts will be in touch shortly.Enquire about this service

IT Governance’s infrastructure penetration test aims to identify vulnerabilities that could be used to breach your network. Your system will be reviewed for vulnerabilities (including those detailed within the OSSTMM (Open Source Security Testing Methodology Manual)) to identify any weaknesses that could allow an attacker to compromise the network, the data stored on it or the devices hosted on it.

The identified vulnerabilities are presented in a format that allows you to assess your organisation’s relative business risk and the cost of remediation.

Your challenge

External infrastructure-related vulnerabilities tend to arise from poor hardware configurations, ineffective system configuration parameters and weak security system controls. Exploiting a vulnerability allows a criminal attacker to gain control in a privileged state and access resources on the network.

Our service offering

  • A review of the testing environment to assess your network and identify information that would be useful to a criminal hacker.
  • A range of manual tests using a methodology closely aligned with the OSSTM.
  • A series of automated vulnerability scans.
  • Immediate notification of any critical vulnerabilities to help you act quickly.
  • A detailed report that identifies and explains the vulnerabilities (ranked in order of significance).
  • A list of recommended countermeasures to address any identified vulnerabilities.
  • An executive summary that explains what the risks mean in business terms.


Our network penetration tests will help you:

  • Gain real-world insight into your vulnerabilities;
  • Identify any patches that need to be installed;
  • Reconfigure software, firewalls and operating systems; and
  • Identify needs for encryption or more secure protocols.

Service conditions

  • The price is applicable for 20 externally facing IP addresses.
  • Consultant expenses related to travelling, etc. are not included in the price.
  • On-site presentation of report findings and remedial consultations can be provided upon request at an additional cost.
  • Discounts for multiple tests only apply when a two- or three-year contract is agreed at the purchase of the first test; discounts cannot be backdated. Each penetration test will be invoiced annually (in the year of the test). An invoice will be issued 28 days before the planned test.
Why IT Governance?

Why choose us?

  • Penetration tests should only be carried out by experienced consultants with the necessary technical skill set and qualifications. Our consultants have strong technical knowledge and a proven track record in finding security vulnerabilities. They can carry out exploits in a safe manner and advise on appropriate mitigation measures to ensure that your systems are secure.
  • Our CREST-certified penetration testing team will provide you with clarity, technical expertise and peace of mind knowing that your wireless network has been reviewed by experienced testers in line with your business requirements.
  • For Azure clients, our penetration tests comply with the Microsoft Rules of Engagement . This means we take care to limit all penetration tests to your assets, thereby avoiding unintended consequences to your customers or your infrastructure.

Require a level 2 penetration test?

We’ve designed our standard packages to be easy and affordable, but if you are unsure of your requirements, or your needs are more complex and involve attempting to exploit the identified vulnerabilities, please call us to discuss. Our consultants can answer your questions and make the process painless. If you would like to talk to one of our testers or meet with them, we would be happy to arrange this for you.

Contact us

Customer Reviews