Completed
Find out the Tech Stack
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Adding Pentest Sauce to Your Vulnerability Management Recipe
Automatically move to the next video in the Classroom when playback concludes
- 1 BreakPoint Labs
- 2 What is our Talk About
- 3 After a Pentest We Hear...
- 4 Caveats
- 5 Bash Kung Fu: Password Reuse
- 6 Tools Beyond Vulnerability Scanner
- 7 Takeaway Here....
- 8 Find out the Tech Stack
- 9 Understand your External Footprint (Cont)
- 10 Investigate Network Shares (Cont)
- 11 Address Web Applications Appropriately
- 12 Address Web Applications (Cont)
- 13 Find All the Devices and Appliances
- 14 Know Vulnerabilities Interesting to Attackers (Cont)
- 15 Be Aware of the impact of Outdated Windows Systems on
- 16 Understand OPSEC Failures and the Impact
- 17 Implement User Awareness Exercise
- 18 Final Thoughts on Tips
- 19 Pentest Trends
- 20 Useful Trainings & Links
- 21 Contact Us