YoVDO

Technical Pen Testing - Red and Blue Working Together

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Penetration Testing Courses Red Team Courses Blue Team Courses Risk Assessment Courses Vulnerability Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk from Louisville InfoSec 2016 featuring Martin Bos on the topic of pen testing and the collaboration between red and blue teams. Delve into the current state of security, the role of red teams, and common vulnerabilities. Learn about blue team responsibilities, remediation strategies, and the importance of cyber hygiene. Discover the evolution of penetration testing, the concept of purple teaming, and how to effectively protect against adversaries. Gain insights on improving vulnerability management, implementing compensating controls, and developing appropriate risk appetites. Acquire practical tips on password policies, easy mitigations, and the benefits of hiring internal pentesters. Understand the value of researching vendors and maximizing the benefits of security assessments in this informative one-hour presentation.

Syllabus

Intro
Martin Bos
Security Today
Enter the Red Team
Its not a Magical Black Art
Easy Wins
Deployment Misconfigurations
Patching
Buy a Vulnerability Scanner
Fix Low Hanging Fruit (HIV)
Same Techniques, Same Methods
Enter the Blue Team
Remediation
Disconnect?
Cyber Hygiene
How do I know if my vulnerability management program is working?
The product industry has set us back 10 years
Death of Traditional Penetration Testing
Red + Blue = Purple
Breach = Panic Mode
Sophisticated
What Am I Trying To Protect?
Know Your Adversaries
Cut Down the Noise
Detection
Compensating Controls
Risk Appetite
Stop Complaining!
Password Policies
Easy Mitigations
Deny access to this computer from the network
Hire an Internal Pentester
Research Your Vendor
What SHOULD I get out of this?


Related Courses

Security Assessment and Testing
Packt via Coursera
Cybersecurity Careers: Become an Identity and Access Management Manager
LinkedIn Learning
PowerShell for Security Professionals
LinkedIn Learning
Blue Team Tools: Defense against Adversary Activity Using MITRE Techniques
Pluralsight
Privilege Escalation with UACMe
Pluralsight