We Hacked the Gibson, Now What? - Cybersecurity Implications and Next Steps
Offered By: YouTube
Course Description
Overview
Explore the aftermath of successful hacking in this 56-minute conference talk from BSidesLV 2014. Delve into the critical considerations and next steps following a successful system breach, as presented by Philip Young. Gain insights into post-exploitation strategies, data exfiltration techniques, and the ethical implications of penetration testing. Learn how to navigate the complex landscape of cybersecurity after achieving initial access, and understand the responsibilities that come with successfully compromising a target system.
Syllabus
bg13 we hacked the gibson now what philip young
Related Courses
Python 3 For Offensive PenTest: A Complete Practical CourseUdemy Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera Network Analysis with Arkime
Pluralsight Cisco Core Security: Secure Network Access, Visibility, and Enforcement
Pluralsight Post Exploitation with Meterpreter
Pluralsight