Adding Pentest Sauce to Your Vulnerability Management Recipe
Offered By: YouTube
Course Description
Overview
Explore a comprehensive talk from BSides NOVA 2018 that combines penetration testing techniques with vulnerability management strategies. Discover how to enhance your security posture by incorporating pentest methodologies into your existing vulnerability management processes. Learn about password reuse detection, advanced tools beyond traditional vulnerability scanners, and techniques for understanding your external footprint. Gain insights on investigating network shares, addressing web application vulnerabilities, and identifying all devices and appliances in your environment. Understand the impact of outdated Windows systems, OPSEC failures, and the importance of user awareness exercises. Delve into current pentest trends and receive recommendations for useful training resources to further develop your skills in this critical area of cybersecurity.
Syllabus
BreakPoint Labs
What is our Talk About
After a Pentest We Hear...
Caveats
Bash Kung Fu: Password Reuse
Tools Beyond Vulnerability Scanner
Takeaway Here....
Find out the Tech Stack
Understand your External Footprint (Cont)
Investigate Network Shares (Cont)
Address Web Applications Appropriately
Address Web Applications (Cont)
Find All the Devices and Appliances
Know Vulnerabilities Interesting to Attackers (Cont)
Be Aware of the impact of Outdated Windows Systems on
Understand OPSEC Failures and the Impact
Implement User Awareness Exercise
Final Thoughts on Tips
Pentest Trends
Useful Trainings & Links
Contact Us
Related Courses
Mobile Devices in Everyday LifeTallinn University via EMMA Windows Support Essentials: Maintenance
Microsoft via edX Advanced IOT Applications
Indian Institute of Science Bangalore via Swayam Computer Fundamentals: Security
Pluralsight Integrating AWS IoT Core in Your Application
Pluralsight