102 Hacking Techniques for IT Security Professionals
Offered By: YouTube
Course Description
Overview
Explore the world of ethical hacking and cybersecurity in this 51-minute conference talk from BSides Tampa 2015. Dive into various hacker types, defensive tools, and techniques for gaining root access. Learn about security measures like BIOS lockdown, Nessus scans, and whitelisting. Discover the importance of IT security professionals, ISO standards, and employee training. Gain insights on topics such as anonymous FTP, honeypots, and penetration testing. Whether you're a beginner or experienced in the field, acquire valuable knowledge to enhance your understanding of hacking methodologies and defense strategies.
Syllabus
Intro
Types of hackers
Tools to defend against hackers
Getting root access
Innate
KANA
Anonymous FTP
Adding a user
BIOS Lockdown
Nessus
DEFCON
IT Security Professionals
ISO Standards
Audit
Mentor
Learning languages
Whitelisting
Keypass
Honeypot
Hacking Sandbox
Training Employees
Pen Test
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity