Artwork

Inhoud geleverd door Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.
Player FM - Podcast-app
Ga offline met de app Player FM !

RCR 139: Conduct security control testing (D6.2)

37:48
 
Delen
 

Manage episode 371901619 series 3464648
Inhoud geleverd door Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

Ready to ace the CISSP exam and level up your cybersecurity knowledge? Together with my background as a former red teamer, we guide you through domain six - security assessments and testing, covering both military and corporate America perspectives. We'll discuss essential concepts such as vulnerability assessments, risk tolerance of companies, and the tools required to identify vulnerabilities.
Join us as we explore the different types of testing, including manual and automated testing, and explain the importance of following security methodologies during a security assessment. You'll learn about penetration testing as a form of surgical strike and its role in gaining long-term access to an organization. Additionally, we'll reveal the importance of securing AWS accounts and API connections to prevent data breaches, and how pen tests can help validate security controls and incident response processes.
Finally, discover the role of automated tools in meeting compliance requirements, like the American Disabilities Act. We'll also examine manual testing, code reviews, and the use of machine learning models and social engineering to manipulate individuals. With our valuable insights and practical examples, you'll be prepared to tackle the CISSP exam and enhance your cybersecurity skills. Don't miss out on this action-packed episode!
Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

  continue reading

187 afleveringen

Artwork
iconDelen
 
Manage episode 371901619 series 3464648
Inhoud geleverd door Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

Ready to ace the CISSP exam and level up your cybersecurity knowledge? Together with my background as a former red teamer, we guide you through domain six - security assessments and testing, covering both military and corporate America perspectives. We'll discuss essential concepts such as vulnerability assessments, risk tolerance of companies, and the tools required to identify vulnerabilities.
Join us as we explore the different types of testing, including manual and automated testing, and explain the importance of following security methodologies during a security assessment. You'll learn about penetration testing as a form of surgical strike and its role in gaining long-term access to an organization. Additionally, we'll reveal the importance of securing AWS accounts and API connections to prevent data breaches, and how pen tests can help validate security controls and incident response processes.
Finally, discover the role of automated tools in meeting compliance requirements, like the American Disabilities Act. We'll also examine manual testing, code reviews, and the use of machine learning models and social engineering to manipulate individuals. With our valuable insights and practical examples, you'll be prepared to tackle the CISSP exam and enhance your cybersecurity skills. Don't miss out on this action-packed episode!
Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

  continue reading

187 afleveringen

Alle afleveringen

×
 
Loading …

Welkom op Player FM!

Player FM scant het web op podcasts van hoge kwaliteit waarvan u nu kunt genieten. Het is de beste podcast-app en werkt op Android, iPhone en internet. Aanmelden om abonnementen op verschillende apparaten te synchroniseren.

 

Korte handleiding

Luister naar deze show terwijl je op verkenning gaat
Spelen