Secure Penetration Testing Operations - Demonstrated Weaknesses in Learning Material and Tools
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the vulnerabilities in penetration testing practices and tools in this 47-minute Black Hat conference talk. Examine how simplified training materials can lead to inadequate protection of client data and testing operations. Learn about the risks penetration testers face from malicious actors and witness a live demonstration of techniques for hijacking standard testing procedures. Gain valuable insights into securing your testing practices and discover tools released alongside the presentation. Delve into topics such as client security, secure communication, data protection, open-source intelligence gathering, and common weaknesses in the field. Understand the most insecure practices and receive recommendations for improving penetration testing operations. Conclude with key takeaways to enhance the security of your penetration testing methodologies.
Syllabus
Welcome
Who are you
Penetration testing in general
Agenda
Study Goal
Client Security
Communication Secure Hate
Client Data in Transit
Open Source Intelligence Gathering
Study Questions
Study Results
Common Weaknesses
Most Insecure Practices
Administrative Proxy List
ZigBee
Recommendations
Demonstration
Conclusion
Core Point
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network