Best pentecte podcasts we could find (Updated December 2017)
Related podcasts: Security Computersecurity Informationsecurity Regulatory Pentesting Owasp Compliance Cissp Cisa Application Privacy Healthcare Legal Podcasts Web Technology Tech Podcasting Education Business  
Pentecte public [search 0]
show episodes
 
C
Cybersecurity, Quality Management, and Pen Testing Training Videos by Warren Alford
 
Quality Management consultant Warren Alford discusses topics such as Quality Management Systems (QMS) for products and services (hardware and software), Cyber Security, Quality Principles, ISO 9001 2015, Risk Management, Quality Tools, Process Improvement, Lean Six Sigma, Supply Chain Management, and Quality Auditing. Look for this podcast in the iTunes Store.
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
S
Securit13 Podcast
Monthly+
 
Первый украинский подкаст об информационной безопасности
 
B
Brakeing Down Security Podcast
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
B
Brakeing Down Security Podcast
Weekly
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
H
Hacker Dialogues
Daily+
 
Hacker Dialogues is podcast where pentesters, hackers, blue teamers, and other miscreants join together to chat about breaking things, tell tales from the road, or bring up anything else that might spark an interest. It is hosted by Beau Bullock (@dafthack) and Derek Banks (@0xderuke). There are no scripts, no schedule, and will hopefully not be a complete waste of your time.
 
Loading …
show series
 
DevOpsDays Chicago 2017 - Automating myself out of a job - A pentesters guide to left shifting security testing by Jahmel HarrisThe security industry works best with a waterfall approach to development and has not keep up with modern methodologies. This talk will look at tools and techniques to shift security testing left so software can be rel ...…
 
JOHANNESBURG — For years, South African Haroon Meer worked as a renowned ethical hacker, being paid by companies to run so-called 'pen' tests (penetration tests) on their networks to determine their vulnerabilities. It's a job that he relished in, but he soon began to realise that pen tests weren't necessarily completely safeguarding companies. ...…
 
JOHANNESBURG — For years, South African Haroon Meer worked as a renowned ethical hacker, being paid by companies to run so-called 'pen' tests (penetration tests) on their networks to determine their vulnerabilities. It's a job that he relished in, but he soon began to realise that pen tests weren't necessarily completely safeguarding companies. ...…
 
H
Hacker Dialogues
 
This is the inaugural episode of Hacker Dialogues. In this episode we talk about Bluetooth base lining, zip bombs, 2FA and password spraying, starting your own pentest company, and how the cloud is really just somebody else's system. Hacker Dialogues is podcast where pentesters, hackers, blue teamers, and other miscreants join together to chat ...…
 
In this talk, I will present a new version of my tool Tinfoleak, the most complete OSINT open-source tool for Twitter. I will show real examples of how to exploit the information in social networks for investigative tasks. The goal is to see, what kind of information can be extracted about a person or a location, and the purpose with which it c ...…
 
C
Chaos Computer Club - recent audio-only feed
 
Your pentesting goal: getting the data. You decide to do it physically. How to go about?#PhysicalSecurityabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
Detecting a breach is hard, detecting someone who targets your network specifically is even harder. As pentesters, we notice that we often remain undetected and breaching an infrastructure via an external server generally goes unnoticed. However, indications of our breach could definitely have been picked up, we could have been detected. So, wh ...…
 
For today's show, we take a deep dive into the law of contracts, featuring the "parol evidence" rule. First, however, we answer a question from special listener Lydia S. who wants to know all about Blac Chyna, Rob Kardashian, and "revenge porn." YOU asked for it! In the main segment, Andrew and Thomas discuss what you can and can't do to disput ...…
 
Direct Link: http://traffic.libsyn.com/brakeingsecurity/2017-023-Jay_Beale-selinux-apparmor-securing_lxc.mp3 Jay Beale works for a pentest firm called "Inguardians", and has always been a fierce friend of the show. He's running a class at both BlackHat and Defcon all about hardening various parts of the Linux OS. This week, we discuss some of t ...…
 
Direct Link: http://traffic.libsyn.com/brakeingsecurity/2017-023-Jay_Beale-selinux-apparmor-securing_lxc.mp3 Jay Beale works for a pentest firm called "Inguardians", and has always been a fierce friend of the show. He's running a class at both BlackHat and Defcon all about hardening various parts of the Linux OS. This week, we discuss some of t ...…
 
Direct Link: http://traffic.libsyn.com/brakeingsecurity/2017-023-Jay_Beale-selinux-apparmor-securing_lxc.mp3 Jay Beale works for a pentest firm called "Inguardians", and has always been a fierce friend of the show. He's running a class at both BlackHat and Defcon all about hardening various parts of the Linux OS. This week, we discuss some of t ...…
 
Doug and Russ talk about the difference in 4 pentesting certs that are very popular. Full Show Notes: https://wiki.securityweekly.com/SDL_episode22 Visit Our Website: securedigitallife.com
 
Doug and Russ talk about the difference in 4 pentesting certs that are very popular. Full Show Notes: https://wiki.securityweekly.com/SDL_episode22 Visit Our Website: https://www.securedigitallife.com
 
I was pleasantly surprised to see a Wordpress site fall into a pentest scope this past week. One helpful tool to get familiar with when attacking Wordpress sites is wpscan, which is built right into Kali - or you can grab it from GitHub. Get familiar with the command line flags as they can help you conduct a more gentle scan that recovers from ...…
 
What should we consider while building an internal penetration testing team? Would you still need external pen tests? Paul and John discuss the pros and cons! Full Show Notes: https://wiki.securityweekly.com/ES_Episode48 Visit http://securityweekly.com/esw for all the latest episodes!
 
What should we consider while building an internal penetration testing team? Would you still need external pen tests? Paul and John discuss the pros and cons! Full Show Notes: https://wiki.securityweekly.com/ES_Episode48 Visit http://securityweekly.com/esw for all the latest episodes!
 
Welcome to week 2 of our Planner Series! Today, we are talking with Helen Colebrook from Journal with Purpose and how she uses her Bullet Journal to plan her days. When I first found Helen on Instagram, I was completely enamored of her simple layout style, the way she combined work with home and her blog post on Using Your Bullet Journal to Get ...…
 
The O’Reilly Security Podcast: Key preparation before implementing a vulnerability disclosure policy, the crucial role of setting scope, and the benefits of collaborative relationships. In this episode, I talk with Kimber Dowsett, security architect at 18F. We discuss how to prepare your organization for a vulnerability disclosure policy, the b ...…
 
H
Homélies N.D. Liban à Bruxelles
 
Evangile: Jean 14:15-20
 
I know what you're thinking, Node.js is server-side right? Not exactly. It turns out many client-side applications have embedded Node.js. And its not always updated to the latest version. And, its vulnerable to attacks! Moses Hernandez is a Consulting Systems Engineer for Cisco Systems and an Instructor for pen testing courses at the SANS Insti ...…
 
In Episode 242, want and need, packing to travel, 10 tips for working with ballpoint ink, the Obsessive Consumption book, and more.
 
Trump was in the news recently for possibly taping conversations in the oval office. But can you do that? Turns out the answer is kinda complicated. If you’re thinking of secretly recording a conversation with someone, you should probably read this first. http://lifehacker.com/what-you-need-to-know-when-recording-your-enemies-1795226719 possibl ...…
 
Intro I mentioned last week that I was speaking at the Secure360 conference here in the Twin Cities, and at that time I was preparing a talk called Pentesting 101: No Hoodie Required. I was so nervous that I've basically spent the last week breathing heavily into paper bags and wishing I was on sedatives. But I have good news to report in today ...…
 
The nervous butterflies are chewing up my organs this week. Why? Because I'm speaking at Secure360 next Tuesday and Wednesday. I'm trying to build a presentation that: Appeals to both techie nerds like me, as well as regular human people Strikes a healthy balance between fun and informative So, my outline is roughly as follows: Intros Lets talk ...…
 
C
Cybersecurity, Quality Management, and Pen Testing Training Videos by Warren Alford
 
In this video, Warren provides a basic introduction for Ubuntu Openssl and Md5 Checksums.
 
Chris Badgett of LifterLMS talks about web and personal security for your course platform with Shaun James from Pentester University in this episode of LMScast. Shaun teaches people how to do ethical hacking in order to perform penetration tests to help strengthen cybersecurity of websites and online businesses. Penetration testing is ethical h ...…
 
S
Screen Testing
 
Are you a watcher or a player? We're joined by Gem Hill to discuss last year's teen psychological thriller, Nerve. It's a deadly (and somewhat cheesy) technological game of truth or dare, available to stream now on Netflix. We discuss the game within the movie, the weird pockets of fame within social media, teen cliques, and how effectively the ...…
 
C
Cybersecurity, Quality Management, and Pen Testing Training Videos by Warren Alford
 
In this video, Warren demonstrates VirtualBox setup for Ubuntu and Kali.
 
C
Cybersecurity, Quality Management, and Pen Testing Training Videos by Warren Alford
 
In this video, Warren provides a basic introduction for Ubuntu Nano, xload, printenv, Calendar, ps, top, and tree commands.
 
C
Cybersecurity, Quality Management, and Pen Testing Training Videos by Warren Alford
 
In this video, Warren discusses changing file permissions and file ownership in Ubuntu.
 
7
7 Minute Security
 
I'm kicking the tires on the PwnPro which is an all-in-one wired, wireless and Bluetooth assessment and pentesting tool. Upon getting plugged into a network, it peers with a cloud portal and lets you assess and pentest from the comfort of your jammies back at your house! Oh, and did I mention it runs Kali on the back end? Delicious. Today's epi ...…
 
Josh and Kurt discuss Lego, bug bounties, pen testing, thought leadership, cars, lemons, entropy, and CVE.
 
Josh and Kurt discuss Lego, bug bounties, pen testing, thought leadership, cars, lemons, entropy, and CVE.
 
Josh and Kurt discuss Lego, bug bounties, pen testing, thought leadership, cars, lemons, entropy, and CVE.
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login