YoVDO

Getting Permission to Break Things

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses Stakeholder Management Courses Security Testing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of obtaining permission for penetration testing in this 43-minute conference talk from BSides Philly 2016. Delve into the challenges of securing approval, addressing client needs, and navigating legal issues in cybersecurity testing. Learn about defining scope, avoiding pitfalls with external devices, and handling potential catastrophic failures. Gain insights on determining allowed actions, measuring success, and recognizing definite failures in penetration testing scenarios. Conclude with a call to action and engage in a Q&A session to deepen your understanding of ethical hacking practices.

Syllabus

Intro
Introduction...
Why Can't I?
Getting Buy-In
Internal Customers
External Clients
Address their needs
Without permission
With permission
Legal Issues
What's in Scope?
Other Devices - Pitfalls
Catastrophic Failures
What is Allowed?
Success / Failure?
Definite Failures
Call to Action
Questions


Related Courses

Principles of Project Management
Polytechnic West via Open2Study
Social Entrepreneurship
Copenhagen Business School via Coursera
Leading Innovation in Arts and Culture
Vanderbilt University via Coursera
Initiating and Planning Projects
University of California, Irvine via Coursera
Project Management: The Basics for Success
University of California, Irvine via Coursera