I ve 2+ yrs exp in manual testing(Windows &Web) I used the pentration testing in the web application.Currently i'm working as a manual tester but i'm intersted in involve in pen testing.. What can i do .If any certification is needeed for that
A penetration test, occasionally pentest, is a method of evaluating the security of a computer system or network by simulating an attack from a malicious source, known as a Black Hat Hacker, or Cracker.
The process involves an active analysis of the system for any potential vulnerabilities that could result from poor or improper system configuration, both known and unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker and can involve active exploitation of security vulnerabilities.
Any security issues that are found will be presented to the system owner, together with an assessment of their impact, and often with a proposal for mitigation or a technical solution. The intent of a penetration test is to determine the feasibility of an attack and the amount of business impact of a successful exploit, if discovered. It is a component of a full security audit.For example, the Payment Card Industry Data Security Standard (PCI DSS), and security and auditing standard, requires both annual and ongoing penetration testing (after system changes).
The process of carrying out a penetration test can reveal sensitive information about an organization. It is for this reason that most security firms are at pains to show that they do not employ ex-black hat hackers and that all employees adhere to a strict ethical code. There are several professional and government certifications that indicate the firm's trustworthiness and conformance to industry best practice.
The Council of Registered Ethical Security Testers (CREST) offers three certifications: CREST Registered Tester, CREST Certified Tester (Infrastructure) and CREST Certified Tester (Web Applications).
CREST (Council of Registered Ethical Security Testers) is a non-profit association created to provide recognised standards and professionalism for the penetration testing industry. For organisations, CREST provides a provable validation of security testing methodologies and practices, aiding with client engagement and procurement processes and proving that the member company is committed to providing testing services to the highest standard. For individuals, CREST provides a career path and industry leading qualifications for penetration testers. Three certifications are currently offered: the CREST Registered Tester and two CREST Certified Tester qualifications, one for infrastructure and one for application testing.
The Information Assurance Certification Review Board (IACRB) manages a penetration testing certification known as the Certified Penetration Tester (CPT). The CPT requires that the exam candidate pass a traditional multiple choice exam, as well as pass a practical exam that requires the candidate to perform a penetration test against live servers.
SANS provides a wide range of computer security training arena leading to a number of SANS qualifications. In 1999, SANS founded GIAC, the Global Information Assurance Certification, which according to SANS has been undertaken by over 20,000 members to date. Two of the GIAC certifications are penetration testing specific: the GIAC Certified Penetration Tester (GPEN) certification; and the GIAC Web Application Penetration Tester (GWAPT) certification.
Government-backed testing also exists in the US with standards such as the NSA Infrastructure Evaluation Methodology (IEM).
For web applications, the Open Web Application Security Project (OWASP) provides a framework of recommendations that can be used as a benchmark.[clarification needed]
The Tiger Scheme offers two certifications: Qualified Tester (QST) and Senior Security Tester (SST). The SST is technical equivalent to CHECK Team Leader.
The International Council of E-Commerce consultants certifies individuals in various e-business and information security skills. These include the Certified Ethical Hacker course, Computer Hacking Forensics Investigator program, Licensed Penetration Tester program and various other programs, which are widely available worldwide.
 United Kingdom-specific certifications
A number of certifications have been developed in the UK, initially for the UK government, and then for the commercial sector, which wanted equivalent levels of assurance.
For many years the only standard/accreditation was the CHECK scheme, administered by CESG (formerly known as the "Communications and Electronic Security Group", part of GCHQ). This standard is a mandatory prerequisite for Central Government testing but, due to EU rules, cannot be enforced for local government and government agency work. It has also been favoured by many commercial blue-chip organizations. Subscriber organizations to the scheme are required to maintain strict ethical standards, and certified individuals are automatically vetted to at least SC level security clearance.
The TIGER Scheme is one of the two non-governmental UK schemes for certifying the skills of penetration testers. The Scheme is managed by a Management Committee composed of industry stakeholders. The TIGER scheme contracts out training to an Operational Authority (OA), which is currently QBit ltd, and testing of applicants to an Examining Body (EB), which is currently Glamorgan University. TIGER certification is available directly from the TIGER bodies, and does not require employment by a member / associate employer. The Tiger Senior Security Tester (SST) has now been granted CHECK Team Leader (CTL) Technical Equivalence by CESG. Tiger maintains a register of certified security testers.[citation
I ve doubt...
I ve knowledge in OWASP Top ten vulnerabilites ,sql2005 and well know about manual testing concept.My question is.. In which area i'll improve for pen testing before study the certification