YoVDO

We Hacked the Gibson, Now What? - Cybersecurity Implications and Next Steps

Offered By: YouTube

Tags

Penetration Testing Courses Network Security Courses Data Exfiltration Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the aftermath of successful hacking in this 56-minute conference talk from BSidesLV 2014. Delve into the critical considerations and next steps following a successful system breach, as presented by Philip Young. Gain insights into post-exploitation strategies, data exfiltration techniques, and the ethical implications of penetration testing. Learn how to navigate the complex landscape of cybersecurity after achieving initial access, and understand the responsibilities that come with successfully compromising a target system.

Syllabus

bg13 we hacked the gibson now what philip young


Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent