Penetration Testing with Red, Blue, and Purple Teams: Executive Briefing
Offered By: Pluralsight
Course Description
Overview
Penetration testing, red team exercises, and bug bounties are all ways an organization can use to find out if its cyber security defenses are working. Discover how to make a success of these active assurance activities, and how to avoid mistakes.
How does an organization know that its cyber security controls are effective? In this executive briefing, Penetration Testing with Red, Blue, and Purple Teams: Executive Briefing, you will learn foundational knowledge about active assurance. First, you will learn about penetration testing. Next, you will discover bug bounties. Finally, you will explore how to make sure the organization really learns from a red team exercise and what you can do to make sure that a red teams doesn’t demotivate your internal (blue) team. When you are finished with this executive briefing, you will have the knowledge of active assurance needed to work with technologists, defenders, and assurance professionals.
How does an organization know that its cyber security controls are effective? In this executive briefing, Penetration Testing with Red, Blue, and Purple Teams: Executive Briefing, you will learn foundational knowledge about active assurance. First, you will learn about penetration testing. Next, you will discover bug bounties. Finally, you will explore how to make sure the organization really learns from a red team exercise and what you can do to make sure that a red teams doesn’t demotivate your internal (blue) team. When you are finished with this executive briefing, you will have the knowledge of active assurance needed to work with technologists, defenders, and assurance professionals.
Syllabus
- Why Active Assurance? 6mins
- Penetration Testing 4mins
- Bug Bounties 2mins
- Red, Blue, and Purple Teams 3mins
- Critical Success Factors 2mins
Taught by
John Elliott
Related Courses
Advanced Cyber Security TrainingEC-Council via FutureLearn Advanced Python Scripting for Cybersecurity
Infosec via Coursera Ciberseguridad
Universidad de los Andes via Coursera Fundamentals of Computer Network Security
University of Colorado System via Coursera Ethical Hacking Course Certification
Cybrary