The Unique Challenges of Accessing Small and Medium Sized Organizations
Offered By: YouTube
Course Description
Overview
Explore the unique challenges of accessing small and medium-sized organizations in this conference talk from SecureWV 2015. Delve into various aspects of information security and penetration testing, including scheduling, pricing considerations, and information gathering techniques. Learn about social engineering tactics, unconventional URL strategies, and methods for bypassing network restrictions. Discover the importance of penetration testing frameworks, virtual private servers, and the concept of purple teaming. Gain insights into effective red team operations and improved reporting methods. Conclude with an overview of network reconnaissance tools to enhance your cybersecurity skillset.
Syllabus
Intro
Information Security
Penetration Testing
Start and Stop Times
Scheduling
Sticker Shock
Information Gathering
Social Engineering
Crazy URL
Comcast
Getting around Comcast
Penetration Testing Framework
Quick Question
Virtual Private Servers
Purple Team
Red Team
Better Reporting
Network Scout
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network