Next Generation Red Teaming - Integrating Application-Centric Attacks

Next Generation Red Teaming - Integrating Application-Centric Attacks

OWASP Foundation via YouTube Direct link

Intro

1 of 19

1 of 19

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Next Generation Red Teaming - Integrating Application-Centric Attacks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Agenda
  3. 3 What Is Red Teaming?
  4. 4 Basic Elements Of A Red Team
  5. 5 Electronic
  6. 6 Social
  7. 7 Physical
  8. 8 Other Activities
  9. 9 Traditional Assessment Process
  10. 10 Why Is This Flawed?
  11. 11 Point In Time Risk Reliance Scenario
  12. 12 Setting Up A Successful Red Team
  13. 13 Threat Modeling And Threat Analysis
  14. 14 Business Goals And Risks
  15. 15 The Software Attack Surface
  16. 16 High Risk Of Low Risk Applications
  17. 17 Composite Attack Scenario
  18. 18 Why Bother?
  19. 19 Scalability

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.