IT Security

Penetration Testing

Finding vulnerabilities an attacker could exploit

The UCLA information security office will attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities.

The Security Office will Pentest for vulnerabilities with the tools listed below:

The Security Office will coordinate specific testing with the departmental IT manager and consolidate findings into a report and provide all of the results as actionable data.

Available to


Eligibility varies per service. Contact your ITCC for details.

Getting Started

Create a service request through the catalog in ServiceNow, or send an email to [email protected] which will create a service request.