Artwork

Content provided by Cyber Security Grey Beard®. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Security Grey Beard® or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Player FM - Aplicație Podcast
Treceți offline cu aplicația Player FM !

S2E9 Cyber Security Offensive Actions

13:21
 
Distribuie
 

Manage episode 293117303 series 2929665
Content provided by Cyber Security Grey Beard®. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Security Grey Beard® or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

NOTE: THIS INFORMATION IS FOR EDUCATIONAL PURPOSES ONLY! I DO NOT CONDONE OR ENDORSE USING THIS INFORMATION FOR ILLEGAL OR NEFARIOUS PURPOSES.

Ethical hacking discussion on offensive actions. I go through standard hacker methodology and actions performed in a breach. I mention jobs associated with these skills and discuss defensive mechanism in association with these offensive actions.

Thank you Cloud Academy (https://cloudacademy.com) for sponsoring this episode

Lockheed Martin Kill Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
Certified Ethical Hacker: https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/

Support the show

  continue reading

53 episoade

Artwork
iconDistribuie
 
Manage episode 293117303 series 2929665
Content provided by Cyber Security Grey Beard®. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Security Grey Beard® or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

NOTE: THIS INFORMATION IS FOR EDUCATIONAL PURPOSES ONLY! I DO NOT CONDONE OR ENDORSE USING THIS INFORMATION FOR ILLEGAL OR NEFARIOUS PURPOSES.

Ethical hacking discussion on offensive actions. I go through standard hacker methodology and actions performed in a breach. I mention jobs associated with these skills and discuss defensive mechanism in association with these offensive actions.

Thank you Cloud Academy (https://cloudacademy.com) for sponsoring this episode

Lockheed Martin Kill Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
Certified Ethical Hacker: https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/

Support the show

  continue reading

53 episoade

Toate episoadele

×
 
Loading …

Bun venit la Player FM!

Player FM scanează web-ul pentru podcast-uri de înaltă calitate pentru a vă putea bucura acum. Este cea mai bună aplicație pentru podcast și funcționează pe Android, iPhone și pe web. Înscrieți-vă pentru a sincroniza abonamentele pe toate dispozitivele.

 

Ghid rapid de referință