YoVDO

What's in My Hacking Tool Box? by Richard Rushing

Offered By: Bugcrowd via YouTube

Tags

Bug Bounty Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses Malware Analysis Courses Static Code Analysis Courses

Course Description

Overview

Explore a comprehensive hacking methodology and essential tools for penetration testing and hacking engagements in this recorded conference talk from LevelUp 0x03. Dive deep into Richard Rushing's approach to cybersecurity, covering a wide range of topics including malware analysis, mobile application exploitation, and API examination. Discover the ultimate set of tools for various scenarios, from universal utilities to specialized instruments for static code analysis, mobile security, cloud environments, and hardware testing. Learn about vulnerability blocking rules and gain insights into the speaker's professional background and nightly activities. Understand the importance of selecting the right toolbox size and equip yourself with knowledge to enhance your cybersecurity skills across multiple domains.

Syllabus

Introduction
Tools
About me
What I do
What happens at night
Vulnerability blocking rules
What in size toolbox do you need
Universal tools
InMap
Static Code
Mobile
Cloud
Hardware


Taught by

Bugcrowd

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent