YoVDO

What's in My Hacking Tool Box? by Richard Rushing

Offered By: Bugcrowd via YouTube

Tags

Bug Bounty Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses Malware Analysis Courses Static Code Analysis Courses

Course Description

Overview

Explore a comprehensive hacking methodology and essential tools for penetration testing and hacking engagements in this recorded conference talk from LevelUp 0x03. Dive deep into Richard Rushing's approach to cybersecurity, covering a wide range of topics including malware analysis, mobile application exploitation, and API examination. Discover the ultimate set of tools for various scenarios, from universal utilities to specialized instruments for static code analysis, mobile security, cloud environments, and hardware testing. Learn about vulnerability blocking rules and gain insights into the speaker's professional background and nightly activities. Understand the importance of selecting the right toolbox size and equip yourself with knowledge to enhance your cybersecurity skills across multiple domains.

Syllabus

Introduction
Tools
About me
What I do
What happens at night
Vulnerability blocking rules
What in size toolbox do you need
Universal tools
InMap
Static Code
Mobile
Cloud
Hardware


Taught by

Bugcrowd

Related Courses

Secure Android App Development
University of Southampton via FutureLearn
DevSecOps: Building a Secure Continuous Delivery Pipeline
LinkedIn Learning
Microsoft DevOps Solutions: Developing Security and Compliance
Pluralsight
Using Security Analysis Tools to Protect ASP.NET and ASP.NET Core Applications
Pluralsight
DevOps with GitHub and Azure: Implementing Software Supply Chain Security with GitHub
Pluralsight