Overview
Explore the world of ethical hacking and cybersecurity in this 51-minute conference talk from BSides Tampa 2015. Dive into various hacker types, defensive tools, and techniques for gaining root access. Learn about security measures like BIOS lockdown, Nessus scans, and whitelisting. Discover the importance of IT security professionals, ISO standards, and employee training. Gain insights on topics such as anonymous FTP, honeypots, and penetration testing. Whether you're a beginner or experienced in the field, acquire valuable knowledge to enhance your understanding of hacking methodologies and defense strategies.
Syllabus
Intro
Types of hackers
Tools to defend against hackers
Getting root access
Innate
KANA
Anonymous FTP
Adding a user
BIOS Lockdown
Nessus
DEFCON
IT Security Professionals
ISO Standards
Audit
Mentor
Learning languages
Whitelisting
Keypass
Honeypot
Hacking Sandbox
Training Employees
Pen Test