YoVDO

Secure Penetration Testing Operations - Demonstrated Weaknesses in Learning Material and Tools

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Network Security Courses Penetration Testing Courses Data Protection Courses Vulnerability Assessment Courses

Course Description

Overview

Explore the vulnerabilities in penetration testing practices and tools in this 47-minute Black Hat conference talk. Examine how simplified training materials can lead to inadequate protection of client data and testing operations. Learn about the risks penetration testers face from malicious actors and witness a live demonstration of techniques for hijacking standard testing procedures. Gain valuable insights into securing your testing practices and discover tools released alongside the presentation. Delve into topics such as client security, secure communication, data protection, open-source intelligence gathering, and common weaknesses in the field. Understand the most insecure practices and receive recommendations for improving penetration testing operations. Conclude with key takeaways to enhance the security of your penetration testing methodologies.

Syllabus

Welcome
Who are you
Penetration testing in general
Agenda
Study Goal
Client Security
Communication Secure Hate
Client Data in Transit
Open Source Intelligence Gathering
Study Questions
Study Results
Common Weaknesses
Most Insecure Practices
Administrative Proxy List
ZigBee
Recommendations
Demonstration
Conclusion
Core Point


Taught by

Black Hat

Related Courses

Evaluación de peligros y riesgos por fenómenos naturales
Universidad Nacional Autónoma de México via Coursera
Internet Security
openHPI
Planning a Security Incident Response
Microsoft via edX
Cyber Security
CEC via Swayam
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam