YoVDO

Secure Penetration Testing Operations - Demonstrated Weaknesses in Learning Material and Tools

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Network Security Courses Penetration Testing Courses Data Protection Courses Vulnerability Assessment Courses

Course Description

Overview

Explore the vulnerabilities in penetration testing practices and tools in this 47-minute Black Hat conference talk. Examine how simplified training materials can lead to inadequate protection of client data and testing operations. Learn about the risks penetration testers face from malicious actors and witness a live demonstration of techniques for hijacking standard testing procedures. Gain valuable insights into securing your testing practices and discover tools released alongside the presentation. Delve into topics such as client security, secure communication, data protection, open-source intelligence gathering, and common weaknesses in the field. Understand the most insecure practices and receive recommendations for improving penetration testing operations. Conclude with key takeaways to enhance the security of your penetration testing methodologies.

Syllabus

Welcome
Who are you
Penetration testing in general
Agenda
Study Goal
Client Security
Communication Secure Hate
Client Data in Transit
Open Source Intelligence Gathering
Study Questions
Study Results
Common Weaknesses
Most Insecure Practices
Administrative Proxy List
ZigBee
Recommendations
Demonstration
Conclusion
Core Point


Taught by

Black Hat

Related Courses

Cryptography II
Stanford University via Coursera
Microsoft Enterprise Mobility Suite
Microsoft via edX
Social Media - What No One has Told You about Privacy
openHPI
Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX
Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX