YoVDO

Give Me Your Data - Obtaining Sensitive Data Without Breaking In

Offered By: YouTube

Tags

Conference Talks Courses Metasploit Courses Data Security Courses

Course Description

Overview

Explore techniques for obtaining sensitive data without unauthorized access in this 53-minute conference talk from DerbyCon 4. Delve into topics such as data loss prevention, hardware handling, Apple device challenges, FTK Imager usage, data destruction methods, social media site vulnerabilities, and Metasploit applications. Learn about real-world findings and their implications for various companies' data security practices. Gain insights into ethical data acquisition methods and understand the importance of robust information security measures in today's digital landscape.

Syllabus

Intro
Data Loss
Data is not secure
Can we obtain sensitive data
What do we do with hardware
I hate Apple
FTK Imager
Data Destruction
Social Media Sites
Results
Metasploit
What I found
Other companies


Related Courses

Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
The Complete Penetration Testing Bootcamp
Udemy
Don's Introduction to Ethical Hacking for Beginners
Udemy
Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
Practice Your First Penetration Test: Kali & Metasploit Lab
Udemy