Best Pentesting podcasts we could find (Updated October 2017)
Related podcasts: Security Computersecurity Informationsecurity Regulatory Owasp Compliance Cissp Cisa Application Privacy Healthcare Legal Podcasts Web Technology Tech Podcasting Education Business Whitelisting  
Pentesting public [search 0]
show episodes
 
C
Cybersecurity, Quality Management, and Pen Testing Training Videos by Warren Alford
 
Quality Management consultant Warren Alford discusses topics such as Quality Management Systems (QMS) for products and services (hardware and software), Cyber Security, Quality Principles, ISO 9001 2015, Risk Management, Quality Tools, Process Improvement, Lean Six Sigma, Supply Chain Management, and Quality Auditing. Look for this podcast in the iTunes Store.
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
S
Securit13 Podcast
Monthly+
 
Первый украинский подкаст об информационной безопасности
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
H
Hacker Dialogues
Daily+
 
Hacker Dialogues is podcast where pentesters, hackers, blue teamers, and other miscreants join together to chat about breaking things, tell tales from the road, or bring up anything else that might spark an interest. It is hosted by Beau Bullock (@dafthack) and Derek Banks (@0xderuke). There are no scripts, no schedule, and will hopefully not be a complete waste of your time.
 
Loading …
show series
 
JOHANNESBURG — For years, South African Haroon Meer worked as a renowned ethical hacker, being paid by companies to run so-called 'pen' tests (penetration tests) on their networks to determine their vulnerabilities. It's a job that he relished in, but he soon began to realise that pen tests weren't necessarily completely safeguarding companies. ...…
 
JOHANNESBURG — For years, South African Haroon Meer worked as a renowned ethical hacker, being paid by companies to run so-called 'pen' tests (penetration tests) on their networks to determine their vulnerabilities. It's a job that he relished in, but he soon began to realise that pen tests weren't necessarily completely safeguarding companies. ...…
 
H
Hacker Dialogues
 
This is the inaugural episode of Hacker Dialogues. In this episode we talk about Bluetooth base lining, zip bombs, 2FA and password spraying, starting your own pentest company, and how the cloud is really just somebody else's system. Hacker Dialogues is podcast where pentesters, hackers, blue teamers, and other miscreants join together to chat ...…
 
In this talk, I will present a new version of my tool Tinfoleak, the most complete OSINT open-source tool for Twitter. I will show real examples of how to exploit the information in social networks for investigative tasks. The goal is to see, what kind of information can be extracted about a person or a location, and the purpose with which it c ...…
 
C
Chaos Computer Club - recent audio-only feed
 
Your pentesting goal: getting the data. You decide to do it physically. How to go about?#PhysicalSecurityabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
Detecting a breach is hard, detecting someone who targets your network specifically is even harder. As pentesters, we notice that we often remain undetected and breaching an infrastructure via an external server generally goes unnoticed. However, indications of our breach could definitely have been picked up, we could have been detected. So, wh ...…
 
Direct Link: http://traffic.libsyn.com/brakeingsecurity/2017-023-Jay_Beale-selinux-apparmor-securing_lxc.mp3 Jay Beale works for a pentest firm called "Inguardians", and has always been a fierce friend of the show. He's running a class at both BlackHat and Defcon all about hardening various parts of the Linux OS. This week, we discuss some of t ...…
 
Direct Link: http://traffic.libsyn.com/brakeingsecurity/2017-023-Jay_Beale-selinux-apparmor-securing_lxc.mp3 Jay Beale works for a pentest firm called "Inguardians", and has always been a fierce friend of the show. He's running a class at both BlackHat and Defcon all about hardening various parts of the Linux OS. This week, we discuss some of t ...…
 
Direct Link: http://traffic.libsyn.com/brakeingsecurity/2017-023-Jay_Beale-selinux-apparmor-securing_lxc.mp3 Jay Beale works for a pentest firm called "Inguardians", and has always been a fierce friend of the show. He's running a class at both BlackHat and Defcon all about hardening various parts of the Linux OS. This week, we discuss some of t ...…
 
Doug and Russ talk about the difference in 4 pentesting certs that are very popular. Full Show Notes: https://wiki.securityweekly.com/SDL_episode22 Visit Our Website: securedigitallife.com
 
Doug and Russ talk about the difference in 4 pentesting certs that are very popular. Full Show Notes: https://wiki.securityweekly.com/SDL_episode22 Visit Our Website: https://www.securedigitallife.com
 
I was pleasantly surprised to see a Wordpress site fall into a pentest scope this past week. One helpful tool to get familiar with when attacking Wordpress sites is wpscan, which is built right into Kali - or you can grab it from GitHub. Get familiar with the command line flags as they can help you conduct a more gentle scan that recovers from ...…
 
What should we consider while building an internal penetration testing team? Would you still need external pen tests? Paul and John discuss the pros and cons! Full Show Notes: https://wiki.securityweekly.com/ES_Episode48 Visit http://securityweekly.com/esw for all the latest episodes!
 
What should we consider while building an internal penetration testing team? Would you still need external pen tests? Paul and John discuss the pros and cons! Full Show Notes: https://wiki.securityweekly.com/ES_Episode48 Visit http://securityweekly.com/esw for all the latest episodes!
 
Welcome to week 2 of our Planner Series! Today, we are talking with Helen Colebrook from Journal with Purpose and how she uses her Bullet Journal to plan her days. When I first found Helen on Instagram, I was completely enamored of her simple layout style, the way she combined work with home and her blog post on Using Your Bullet Journal to Get ...…
 
The O’Reilly Security Podcast: Key preparation before implementing a vulnerability disclosure policy, the crucial role of setting scope, and the benefits of collaborative relationships. In this episode, I talk with Kimber Dowsett, security architect at 18F. We discuss how to prepare your organization for a vulnerability disclosure policy, the b ...…
 
I know what you're thinking, Node.js is server-side right? Not exactly. It turns out many client-side applications have embedded Node.js. And its not always updated to the latest version. And, its vulnerable to attacks! Moses Hernandez is a Consulting Systems Engineer for Cisco Systems and an Instructor for pen testing courses at the SANS Insti ...…
 
In Episode 242, want and need, packing to travel, 10 tips for working with ballpoint ink, the Obsessive Consumption book, and more.
 
Intro I mentioned last week that I was speaking at the Secure360 conference here in the Twin Cities, and at that time I was preparing a talk called Pentesting 101: No Hoodie Required. I was so nervous that I've basically spent the last week breathing heavily into paper bags and wishing I was on sedatives. But I have good news to report in today ...…
 
The nervous butterflies are chewing up my organs this week. Why? Because I'm speaking at Secure360 next Tuesday and Wednesday. I'm trying to build a presentation that: Appeals to both techie nerds like me, as well as regular human people Strikes a healthy balance between fun and informative So, my outline is roughly as follows: Intros Lets talk ...…
 
C
Cybersecurity, Quality Management, and Pen Testing Training Videos by Warren Alford
 
In this video, Warren provides a basic introduction for Ubuntu Openssl and Md5 Checksums.
 
Chris Badgett of LifterLMS talks about web and personal security for your course platform with Shaun James from Pentester University in this episode of LMScast. Shaun teaches people how to do ethical hacking in order to perform penetration tests to help strengthen cybersecurity of websites and online businesses. Penetration testing is ethical h ...…
 
S
Screen Testing
 
Are you a watcher or a player? We're joined by Gem Hill to discuss last year's teen psychological thriller, Nerve. It's a deadly (and somewhat cheesy) technological game of truth or dare, available to stream now on Netflix. We discuss the game within the movie, the weird pockets of fame within social media, teen cliques, and how effectively the ...…
 
C
Cybersecurity, Quality Management, and Pen Testing Training Videos by Warren Alford
 
In this video, Warren demonstrates VirtualBox setup for Ubuntu and Kali.
 
C
Cybersecurity, Quality Management, and Pen Testing Training Videos by Warren Alford
 
In this video, Warren provides a basic introduction for Ubuntu Nano, xload, printenv, Calendar, ps, top, and tree commands.
 
C
Cybersecurity, Quality Management, and Pen Testing Training Videos by Warren Alford
 
In this video, Warren discusses changing file permissions and file ownership in Ubuntu.
 
7
7 Minute Security
 
I'm kicking the tires on the PwnPro which is an all-in-one wired, wireless and Bluetooth assessment and pentesting tool. Upon getting plugged into a network, it peers with a cloud portal and lets you assess and pentest from the comfort of your jammies back at your house! Oh, and did I mention it runs Kali on the back end? Delicious. Today's epi ...…
 
Josh and Kurt discuss Lego, bug bounties, pen testing, thought leadership, cars, lemons, entropy, and CVE.
 
Josh and Kurt discuss Lego, bug bounties, pen testing, thought leadership, cars, lemons, entropy, and CVE.
 
Josh and Kurt discuss Lego, bug bounties, pen testing, thought leadership, cars, lemons, entropy, and CVE.
 
E
Exploring Information Security - Timothy De Block
 
In this looking for more edition of the Exploring Information Security podcast, I've got two job postings and two people looking for an opportunity in infosec. Job postings The two postings I have are from my place of employment, Premise Health. We have a Jr. Pen Tester and Security Engineer role. Both positions will require you to relocate to ...…
 
H
HARAJUKU DATA LAKE
 
In this week's episode, Morris and Sergio chat about security: Sergio's background in security, pen testing, the evolution of security threats, security auditing, defensive practices, careers in security, and recent developments. Show Notes Follow us on Twitter! Like us on Facebook! Rate us in iTunes Subscribe in Overcast Changing your Windows ...…
 
S
Smashing Security - News and views from the world of cybersecurity, hacking, and internet threats
 
Don't let an internet-enabled sex toy make your most private moments oh-so-public. Samsung's wannabe-Android-killer is found lacking. And did you hear about the firm that is micro-chipping its employees? All this and more is discussed by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest John Hawes. ...…
 
S
Smashing Security
 
Don't let an internet-enabled sex toy make your most private moments oh-so-public. Samsung's wannabe-Android-killer is found lacking. And did you hear about the firm that is micro-chipping its employees? All this and more is discussed by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest John Hawes. ...…
 
S
Smashing Security
 
Don't let an internet-enabled sex toy make your most private moments oh-so-public. Samsung's wannabe-Android-killer is found lacking. And did you hear about the firm that is micro-chipping its employees? All this and more is discussed by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest John Hawes. ...…
 
One of our Slackers (people who hang with us on our Slack Channel) mentioned that he was writing exam materials for one of the programs created by the UK Government to train high school and/or people headed to university in skills without the traditional 4 year education track. I was very intrigued by this, since we don't appear to have anythin ...…
 
One of our Slackers (people who hang with us on our Slack Channel) mentioned that he was writing exam materials for one of the programs created by the UK Government to train high school and/or people headed to university in skills without the traditional 4 year education track. I was very intrigued by this, since we don't appear to have anythin ...…
 
One of our Slackers (people who hang with us on our Slack Channel) mentioned that he was writing exam materials for one of the programs created by the UK Government to train high school and/or people headed to university in skills without the traditional 4 year education track. I was very intrigued by this, since we don't appear to have anythin ...…
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login