YoVDO

Getting Permission to Break Things

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses Stakeholder Management Courses Security Testing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of obtaining permission for penetration testing in this 43-minute conference talk from BSides Philly 2016. Delve into the challenges of securing approval, addressing client needs, and navigating legal issues in cybersecurity testing. Learn about defining scope, avoiding pitfalls with external devices, and handling potential catastrophic failures. Gain insights on determining allowed actions, measuring success, and recognizing definite failures in penetration testing scenarios. Conclude with a call to action and engage in a Q&A session to deepen your understanding of ethical hacking practices.

Syllabus

Intro
Introduction...
Why Can't I?
Getting Buy-In
Internal Customers
External Clients
Address their needs
Without permission
With permission
Legal Issues
What's in Scope?
Other Devices - Pitfalls
Catastrophic Failures
What is Allowed?
Success / Failure?
Definite Failures
Call to Action
Questions


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube