Getting Permission to Break Things
Offered By: YouTube
Course Description
Overview
Explore the intricacies of obtaining permission for penetration testing in this 43-minute conference talk from BSides Philly 2016. Delve into the challenges of securing approval, addressing client needs, and navigating legal issues in cybersecurity testing. Learn about defining scope, avoiding pitfalls with external devices, and handling potential catastrophic failures. Gain insights on determining allowed actions, measuring success, and recognizing definite failures in penetration testing scenarios. Conclude with a call to action and engage in a Q&A session to deepen your understanding of ethical hacking practices.
Syllabus
Intro
Introduction...
Why Can't I?
Getting Buy-In
Internal Customers
External Clients
Address their needs
Without permission
With permission
Legal Issues
What's in Scope?
Other Devices - Pitfalls
Catastrophic Failures
What is Allowed?
Success / Failure?
Definite Failures
Call to Action
Questions
Related Courses
Principles of Project ManagementPolytechnic West via Open2Study Social Entrepreneurship
Copenhagen Business School via Coursera Leading Innovation in Arts and Culture
Vanderbilt University via Coursera Initiating and Planning Projects
University of California, Irvine via Coursera Project Management: The Basics for Success
University of California, Irvine via Coursera