Главная
Study mode:
on
1
Intro
2
Types of hackers
3
Tools to defend against hackers
4
Getting root access
5
Innate
6
KANA
7
Anonymous FTP
8
Adding a user
9
BIOS Lockdown
10
Nessus
11
DEFCON
12
IT Security Professionals
13
ISO Standards
14
Audit
15
Mentor
16
Learning languages
17
Whitelisting
18
Keypass
19
Honeypot
20
Hacking Sandbox
21
Training Employees
22
Pen Test
Description:
Explore the world of ethical hacking and cybersecurity in this 51-minute conference talk from BSides Tampa 2015. Dive into various hacker types, defensive tools, and techniques for gaining root access. Learn about security measures like BIOS lockdown, Nessus scans, and whitelisting. Discover the importance of IT security professionals, ISO standards, and employee training. Gain insights on topics such as anonymous FTP, honeypots, and penetration testing. Whether you're a beginner or experienced in the field, acquire valuable knowledge to enhance your understanding of hacking methodologies and defense strategies.

102 Hacking Techniques for IT Security Professionals

Add to list
0:00 / 0:00