YoVDO

Getting Permission to Break Things

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses Stakeholder Management Courses Security Testing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of obtaining permission for penetration testing in this 43-minute conference talk from BSides Philly 2016. Delve into the challenges of securing approval, addressing client needs, and navigating legal issues in cybersecurity testing. Learn about defining scope, avoiding pitfalls with external devices, and handling potential catastrophic failures. Gain insights on determining allowed actions, measuring success, and recognizing definite failures in penetration testing scenarios. Conclude with a call to action and engage in a Q&A session to deepen your understanding of ethical hacking practices.

Syllabus

Intro
Introduction...
Why Can't I?
Getting Buy-In
Internal Customers
External Clients
Address their needs
Without permission
With permission
Legal Issues
What's in Scope?
Other Devices - Pitfalls
Catastrophic Failures
What is Allowed?
Success / Failure?
Definite Failures
Call to Action
Questions


Related Courses

Web and Mobile Testing with Selenium
University of Minnesota via Coursera
DevOps Pipeline: Automatización hasta el despliegue
Universidad Anáhuac via edX
Programming Foundations: Software Testing/QA
LinkedIn Learning
Security Assessment and Testing for CISSP®

Pluralsight
EU Panel: The Joys of Integrating Security Testing into Your Pipeline
Pluralsight