Penetration Testing with Red, Blue, and Purple Teams: Executive Briefing
Offered By: Pluralsight
Course Description
Overview
Penetration testing, red team exercises, and bug bounties are all ways an organization can use to find out if its cyber security defenses are working. Discover how to make a success of these active assurance activities, and how to avoid mistakes.
How does an organization know that its cyber security controls are effective? In this executive briefing, Penetration Testing with Red, Blue, and Purple Teams: Executive Briefing, you will learn foundational knowledge about active assurance. First, you will learn about penetration testing. Next, you will discover bug bounties. Finally, you will explore how to make sure the organization really learns from a red team exercise and what you can do to make sure that a red teams doesn’t demotivate your internal (blue) team. When you are finished with this executive briefing, you will have the knowledge of active assurance needed to work with technologists, defenders, and assurance professionals.
How does an organization know that its cyber security controls are effective? In this executive briefing, Penetration Testing with Red, Blue, and Purple Teams: Executive Briefing, you will learn foundational knowledge about active assurance. First, you will learn about penetration testing. Next, you will discover bug bounties. Finally, you will explore how to make sure the organization really learns from a red team exercise and what you can do to make sure that a red teams doesn’t demotivate your internal (blue) team. When you are finished with this executive briefing, you will have the knowledge of active assurance needed to work with technologists, defenders, and assurance professionals.
Syllabus
- Why Active Assurance? 6mins
- Penetration Testing 4mins
- Bug Bounties 2mins
- Red, Blue, and Purple Teams 3mins
- Critical Success Factors 2mins
Taught by
John Elliott
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent