Opening the Treasure Chest: Attacking Network Attached Storage on a Pen Test
Offered By: YouTube
Course Description
Overview
Explore techniques for attacking Network Attached Storage (NAS) devices during penetration testing in this conference talk from BSides Rhode Island 2013. Learn about vulnerabilities commonly found in NAS systems and how to exploit them effectively. Gain insights into the security implications of NAS devices in corporate networks and discover methods to improve their protection. Understand the importance of including NAS devices in penetration testing scopes and how to approach them systematically. Delve into real-world examples and case studies presented by the speaker, Russ, to enhance your knowledge of NAS security assessment.
Syllabus
BsidesRI 2013 4 Opening the Treasure Chest Attacking Network Attached Storage on a Pen Test Russ
Related Courses
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery(ISC)² via Coursera Temel Seviye Etik Hacker Eğitimi
Udemy Managing Microsoft Azure Security
Pluralsight Security Control Assessment
Pluralsight Security Assessment and Testing for CISSP®
Pluralsight