Adding Pentest Sauce to Your Vulnerability Management Recipe

Adding Pentest Sauce to Your Vulnerability Management Recipe

via YouTube Direct link

Address Web Applications Appropriately

11 of 21

11 of 21

Address Web Applications Appropriately

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Adding Pentest Sauce to Your Vulnerability Management Recipe

Automatically move to the next video in the Classroom when playback concludes

  1. 1 BreakPoint Labs
  2. 2 What is our Talk About
  3. 3 After a Pentest We Hear...
  4. 4 Caveats
  5. 5 Bash Kung Fu: Password Reuse
  6. 6 Tools Beyond Vulnerability Scanner
  7. 7 Takeaway Here....
  8. 8 Find out the Tech Stack
  9. 9 Understand your External Footprint (Cont)
  10. 10 Investigate Network Shares (Cont)
  11. 11 Address Web Applications Appropriately
  12. 12 Address Web Applications (Cont)
  13. 13 Find All the Devices and Appliances
  14. 14 Know Vulnerabilities Interesting to Attackers (Cont)
  15. 15 Be Aware of the impact of Outdated Windows Systems on
  16. 16 Understand OPSEC Failures and the Impact
  17. 17 Implement User Awareness Exercise
  18. 18 Final Thoughts on Tips
  19. 19 Pentest Trends
  20. 20 Useful Trainings & Links
  21. 21 Contact Us

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.