YoVDO

Adding Pentest Sauce to Your Vulnerability Management Recipe

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Network Security Courses Penetration Testing Courses Web Application Security Courses Device Security Courses Operational Security Courses Bash Scripting Courses Vulnerability Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive talk from BSides NOVA 2018 that combines penetration testing techniques with vulnerability management strategies. Discover how to enhance your security posture by incorporating pentest methodologies into your existing vulnerability management processes. Learn about password reuse detection, advanced tools beyond traditional vulnerability scanners, and techniques for understanding your external footprint. Gain insights on investigating network shares, addressing web application vulnerabilities, and identifying all devices and appliances in your environment. Understand the impact of outdated Windows systems, OPSEC failures, and the importance of user awareness exercises. Delve into current pentest trends and receive recommendations for useful training resources to further develop your skills in this critical area of cybersecurity.

Syllabus

BreakPoint Labs
What is our Talk About
After a Pentest We Hear...
Caveats
Bash Kung Fu: Password Reuse
Tools Beyond Vulnerability Scanner
Takeaway Here....
Find out the Tech Stack
Understand your External Footprint (Cont)
Investigate Network Shares (Cont)
Address Web Applications Appropriately
Address Web Applications (Cont)
Find All the Devices and Appliances
Know Vulnerabilities Interesting to Attackers (Cont)
Be Aware of the impact of Outdated Windows Systems on
Understand OPSEC Failures and the Impact
Implement User Awareness Exercise
Final Thoughts on Tips
Pentest Trends
Useful Trainings & Links
Contact Us


Related Courses

Powershell Security Best Practices
Microsoft via edX
The Complete Cyber Security Course : Anonymous Browsing!
Udemy
Introduction to Information Security
Pluralsight
Cyber Security Base
University of Helsinki via Independent
Cybersecurity Foundations
LinkedIn Learning