YoVDO

Opening the Treasure Chest: Attacking Network Attached Storage on a Pen Test

Offered By: YouTube

Tags

Penetration Testing Courses Network Security Courses Vulnerability Assessment Courses Security Assessment Courses Network Attached Storage Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore techniques for attacking Network Attached Storage (NAS) devices during penetration testing in this conference talk from BSides Rhode Island 2013. Learn about vulnerabilities commonly found in NAS systems and how to exploit them effectively. Gain insights into the security implications of NAS devices in corporate networks and discover methods to improve their protection. Understand the importance of including NAS devices in penetration testing scopes and how to approach them systematically. Delve into real-world examples and case studies presented by the speaker, Russ, to enhance your knowledge of NAS security assessment.

Syllabus

BsidesRI 2013 4 Opening the Treasure Chest Attacking Network Attached Storage on a Pen Test Russ


Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent