š Register for webcasts, summits, and workshops – https://poweredbybhis.com š š« Professionally Evil API Testing: A Practical Course for Beginners with Jennifer Shannon https://www.antisyphontraining.com/course/professionally-evil-api-testing-a-practical-course-for-beginners-with-jennifer-shannon/ This webcast will be a gas Join us for a free one-hour Antisyphon Anti-cast, with instructor, Jennifer Shannon, to learn the …
š Register for webcasts, summits, and workshops – https://poweredbybhis.com š Webcast Slides! – https://www.antisyphontraining.com/wp-content/uploads/2024/08/2024_08_07_anticast_New-Methods-to-Attack-Defend-Active-Directory_Eric-Kuehn.pdf New Methods to Attack & Defend Active Directory w/ Eric Kuehn With the recent enhancements Microsoft has made to Active Directory security, staying hidden during a penetration test has gotten harder. …
In this video, Mike from Black Hills Information Security discusses the comprehensive process and various methodologies involved in penetration testing. He breaks down the different types of penetration tests, such as external, internal, and cloud pentests, and explains the phases from reconnaissance to reporting.
In this video, John discusses best practices and lessons learned from his extensive experience in penetration testing. He delves into the common pitfalls and mistakes in the cybersecurity industry, offering insights on how to avoid them.
In this video, Beau discusses securing AWS, focusing on lateral movement in the cloud. He explains initial access and post-compromise techniques, demonstrating AWS CLI usage for enumerating resources and escalating privileges.
In this video, the speaker discusses the concept of cyber deception and its practical applications in domains. They delve into the effectiveness of commercial cyber deception tools and share insights on creating a deceptive environment with fake user IDs and system names.
/// š Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium Incident Response as a Recovering Pentester – Alter Basaran Hi, my name is Alper and Iām a Penetration Tester and your Incident Responder.ā Over the past year our company has sent me to more incident …
In this video, Jeff McJunkin discusses the differences and nuances between penetration testing and red teaming, focusing on their respective roles in cybersecurity. He elaborates on the unique approaches and objectives of each, highlighting how they test organizational defenses differently.
In this video, BB King discusses the essentials of setting up and using Burp Suite for web application penetration testing. He covers initial setup, including configuring browsers and managing certificates, and explores various features such as the intercept function, repeater, intruder, and the extender with its wealth of extensions.
In this video, Serena discusses the basics of subnetting in networking, aiming to demystify the topic for beginners and encourage further exploration. They explain the concept of subnet masks, CIDR notation, and how these elements are used to define network and host addresses within a network.