Adding Pentest Sauce to Your Vulnerability Management Recipe
Offered By: YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive talk from BSides NOVA 2018 that combines penetration testing techniques with vulnerability management strategies. Discover how to enhance your security posture by incorporating pentest methodologies into your existing vulnerability management processes. Learn about password reuse detection, advanced tools beyond traditional vulnerability scanners, and techniques for understanding your external footprint. Gain insights on investigating network shares, addressing web application vulnerabilities, and identifying all devices and appliances in your environment. Understand the impact of outdated Windows systems, OPSEC failures, and the importance of user awareness exercises. Delve into current pentest trends and receive recommendations for useful training resources to further develop your skills in this critical area of cybersecurity.
Syllabus
BreakPoint Labs
What is our Talk About
After a Pentest We Hear...
Caveats
Bash Kung Fu: Password Reuse
Tools Beyond Vulnerability Scanner
Takeaway Here....
Find out the Tech Stack
Understand your External Footprint (Cont)
Investigate Network Shares (Cont)
Address Web Applications Appropriately
Address Web Applications (Cont)
Find All the Devices and Appliances
Know Vulnerabilities Interesting to Attackers (Cont)
Be Aware of the impact of Outdated Windows Systems on
Understand OPSEC Failures and the Impact
Implement User Awareness Exercise
Final Thoughts on Tips
Pentest Trends
Useful Trainings & Links
Contact Us
Related Courses
Cybersecurity for BusinessCodecademy Securely Connecting AWS IoT Devices to the Cloud V01.00.00
Amazon Web Services via Coursera Cybersecurity Threat Vectors and Mitigation
Microsoft via Coursera End User Cyber Fundamentals
Cybrary Mobile App Security
Cybrary