📜 ⬆️ ⬇️

Be a security ninja: secret level



Information security is one of the disciplines gaining enormous popularity in recent years. We decided to help everyone and organized a cycle of free webinars on information security. Today we publish videos of the final cycle of webinars on practical information security.

Intro


The first part of the webinars on the main areas of information security is available here . In the second part of the webinars, we revealed the practical aspects of penetration testing. Initially, one webinar was planned, but the topic is quite extensive and interesting, so we decided to expand it into three webinars.
')

Network Perimeter Attack


At the webinar, we looked at how network perimeter attacks, practical cases and pentester tools occur.



Onside attacks


At the webinar, we covered topics for capturing a domain controller in a matter of minutes, gaining access to the processing of the bank, with minimal privileges in the system. A separate part of the webinar was devoted to the review of tools for conducting attacks.



Web application attacks


At the webinar, we looked at how to exploit critical data and attack the top management of the company using web vulnerabilities. Disassembled tools to identify vulnerabilities, services to strengthen skills in testing for penetration of web applications.



Outro


Speakers, they are super-experts of Jet Infosystems:


Moderators, they are the fairies of the Jet Infosystems marketing:


Statistics:




We would be grateful for your responses to a small survey on past webinars.

.
S̭͎̲͔͖͉̼̔̆͋̃̄̚͟͡ť̨̼̬̠̞̱̟̟͍̃̀̅̇̌͜͠a̖̘̣͍̭̻̯̩͚̱͊͊̔̉̅͛̕͠ý̸̸̸̸̸̸̸̸̡̨̡̨̧̧̧̧̧̧̛̛̱̦̫̪̲̫̞̝̖̬̭̫̞̝̖̬̭̫̞̝̖̬̭̗̪̥̯̗̪̥̯̗̤̺̻̘̗̤̺̻̘̗̤̺̻̘̗̤̺̻̘̗̤̺̻̘̗̤̺̻̘̃̒̓́͆̆͆̆̑̈̑̈̑̈̎̂̐̈̎̂̐̈͌̋̇͋͌̋̇͋͐͋̂̿̂͆̾̇͂͐͋̂̿̂͆̾̇͂͐͋̂̿̂͆̾̇͂͐͋̂̿̂͆̾̇͂͐͋̂̿̂͆̾̇͂͐͋̂̿̂͆̾̇͂̕̚̕̚̕̕̕̕̕̕͜͜͠͠͡͡ ̸̧̗̤̺̻̘͐͋̂̿̂͆̾̇͂̕
.

Source: https://habr.com/ru/post/430738/


All Articles