YoVDO

Hacking Identity - A Pen Tester's Guide to IAM

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Penetration Testing Courses Identity and Access Management (IAM) Courses Identity and Access Management Courses Two-Factor Authentication Courses

Course Description

Overview

Explore the world of Identity and Access Management (IAM) from a penetration tester's perspective in this comprehensive conference talk. Delve into passive intelligence gathering techniques, including the use of Pastebin, password analysis, and social media quizzes. Examine various attack vectors and challenges in IAM, such as provisioning and deprovisioning processes, attribute management, and help desk vulnerabilities. Learn about red team strategies, document metadata analysis, and technology stack considerations. Discover practical tools for setting up a home lab and gain insights into two-factor authentication and social media security. Enhance your understanding of IAM security through hands-on examples and real-world scenarios presented by experienced security professional Jerod Brennen.

Syllabus

Intro
Jerods background
F5 report
Passive intelligence gathering
Pastebin
Passwords
Social Media Quizzes
Software as a Service
Attack vectors
The challenge
Provisioning deprovisioning
Attributes
Help Desk
Red Team
Document Metadata
Technology Stack
Password Spray
Home Lab Tools
TwoFactor
Facebook
Social Media Quiz


Related Courses

AWS Certified Solutions Architect - Associate (SAA-C02)
A Cloud Guru
AWS Certified Solutions Architect Associate SAA-C02
A Cloud Guru
AWS Certified SysOps Administrator - Associate
A Cloud Guru
AWS Certified SysOps Administrator - Associate 2020
A Cloud Guru
AWS Cloud Practitioner - CLF-C01 (LA)
A Cloud Guru