Method of evaluating computer and network security by simulating a cyber attack
POPULARITY
Podcast: OT Security Made SimpleEpisode: Aus dem Tagebuch eines OT-Pentesters | OT Security Made SimplePub date: 2025-03-11Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationPatrick Latus berichtet als passionierter Pentester von vorderster Front der OT-Sicherheit. Von fehlendem Bewusstsein und Expertise bei Herstellern, Anwendenden und Auditor:innen bis zur Frage, ob OT-Sicherheitsvorfälle nur deshalb nicht publik werden, weil sie schlichtweg nicht gesehen werden. The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Patrick Latus berichtet als passionierter Pentester von vorderster Front der OT-Sicherheit. Von fehlendem Bewusstsein und Expertise bei Herstellern, Anwendenden und Auditor:innen bis zur Frage, ob OT-Sicherheitsvorfälle nur deshalb nicht publik werden, weil sie schlichtweg nicht gesehen werden.
Kan pentester automatiseras? Ja det finns faktiskt verktyg som kan genomföra sådana tester. Men vad tycker Mattias Jadesköld och Erik Zalitis om det? I dagens avsnitt diskuterar duon skillnanden mellan manuella och automatiska pentester. Men även arbetet med sårbarheter både ur ett tekniskt och processmässigt perspektiv.
Sponsor by SEC Playground
In this episode of the PowerShell Podcast, we sit down with Miriam Wiesner, a Senior Security Research Program Manager at Microsoft, to dive into the fascinating world of security and identity hygiene. Miriam shares her expertise on the GraphAPI and the critical importance of maintaining proper identity hygiene in today's digital landscape. We explore the day-to-day life of a security researcher and discuss how tools like script block logging can provide invaluable insights. Miriam also highlights the power of Kusto for analyzing data and solving complex challenges in the security space. In addition to technical insights, Miriam opens up about the challenges of maintaining a healthy work-life balance, offering a candid look at the human side of working in a demanding and impactful field. Guest Bio and links: Miriam C. Wiesner is a Sr. Security Research Program Manager at Microsoft with over 15 years of experience in IT and IT Security. She has held various positions, including Administrator/System Engineer, Software Developer, Premier Field Engineer, Program Manager, and Security Consultant and Pentester. She is also a renowned creator of open-source tools based in PowerShell, including EventList and JEAnalyzer. She was invited multiple times to present her research behind her tools at many international conferences like Black Hat (USA, Europe & Asia), PSConf EU, MITRE ATT&CK workshop, and more. Miriam is the author of the book "PowerShell Automation and Scripting for CyberSecurity: Hacking and Defense for Red and Blue Teamers." Outside of work, Miriam is a dedicated wife and mother, residing with her family near Nuremberg, Germany. Previous episode with Miriam - https://www.youtube.com/watch?v=0Csw8YYGyCg&pp=ygUObWlyaWFtIHdpZXNuZXI%3D Practical PowerShell Empowerment For Protectors - https://www.youtube.com/watch?v=JgqbR-7O7TI&pp=ygUObWlyaWFtIHdpZXNuZXI%3D Echoes of Intrusion: Demystifying commonly used MS Graph API Attacks - https://www.youtube.com/watch?v=YDK5xYx1rKg&t=677s&pp=ygUObWlyaWFtIHdpZXNuZXI%3D PowerShell ❤️ the Blue Team - https://devblogs.microsoft.com/powershell/powershell-the-blue-team/ https://techcommunity.microsoft.com/blog/microsoftsentinelblog/the-power-of-data-collection-rules-detect-disabling-windows-defender-real-time-p/4236540 PowerShell Podcast Home page: https://www.pdq.com/resources/the-powershell-podcast/ Listen to the PowerShell Podcast: https://powershellpodcast.podbean.com/
Today I do a short travelogue about my trip to Washington, geek out about some cool training I did with Velociraptor, ponder drowning myself in blue team knowledge with XINTRA LABS, and share some thoughts about the conference talk I gave called 7 Ways to Panic a Pentester.
If the biggest ever data breaches were arranged by size, the recent compromise of National Public Data would be right up there near the top of the list. You may have never heard of NPD, but it has probably heard of you: as a major provider of background check services, it maintains a massive database containing more than 3 billion names, addresses, social security numbers, and other data. This data was recently compromised and offered for sale online to cybercriminals, who flock to such information because it gives them everything they need to set up new bank accounts, credit cards, and other finance in your name. This data can also be cross-matched with other breaches to help conduct other criminal activity – such as accessing your online services or personalizing phishing emails to target you or the company you work with. If you're not already regularly checking to see if you have been compromised in a recent data breach, take a moment to drop by https://npd.pentester.com, where security firm Pentester offers a way to see if you were caught up in this latest breach, and what you should do about it if so. The 60-second "Security Nudge" is brought to you by CybSafe, developers of the Human Risk Management Platform. Learn more at https://cybsafe.com
Episode 162 - Aug. 19th, 2024 - Fraud Alert - No Violations - (Except For BeatKing) - Laws Of Energy For Human Life - Mind Is Energy - The Compound Effect - “National Public Data” Data Breach - CLICK HERE - NPD.Pentester.com To See If Your Data Is Leaked - Social Media Algorithm & How they hook you…. - Heman Bekele aka Time Magazine's 2024 Kid Of The Year - Some people are nasty, especially in PUBLIC PLACES (i.e. The Gym) - Gym Woes with DJ Intence - Idaho Man Gets 30 Years In Prison For Purposely Spreading HIV Through Sex - Turkey Has Restored Access To Instagram - The Forest Gomez Story (9 Year Old Helps Father With Kidney Transplant) - Songs Of The Episode - Kang “Day 5” - RIP BeatKing (Houston, Texas) - Please get your Physical (Yearly) - Wise Guy's Corner Segment - Why has the bachelor parties fallen off recently among men? - DJ Intence as a Team Player While DJing - Wise Guy's Corner Segment - Story Time. A Woman reveals to her boyfriend that her Best Friends used to be her Ex-Boyfriend. Is she wrong for this? - Songs Of The Episode - Keanu Goin' Stoopid “Ain't My Fault” ONE AGAIN CHECK FOR YOUR DATA is EXPOSED ONLINE HERE ----> NPD Pentester
Rich discusses the new Pixel hardware from the latest Made By Google Event. Here's how to check if your SSN was involved in that massive data breach. Links to freeze credit reports: Experian, TransUnion, Equifax Ryan Montgomery, founder of cybersecurity firm Pentester. NPD Breach Check Tool Mentioned: Bitdefender and ESET for anti-virus, iVPN and Mullvad for VPNs Follow Ryan on Instagram for more cybersecurity info and tips Eric in the I.E. asks there's something similar to Pixel's Call Notes feature for the iPhone. Apple is adding a call recording feature in iOS 18. Samsung is bringing Circle to Search to select Galaxy A series smartphones. Rich shares details on the Pixel Watch 3 and Pixel Buds Pro 2. Maxx in Lake Worth, FL says you should consider freezing one more system from ChexSystems to avoid identify theft with bank accounts being opened in your name. Mark in Woodland Hills is wondering if there's a way to keep his phone cool while cycling outside. Rich mentioned the Phoozy phone case. Fitbit Premium users will have access to some Peloton classes starting in September. Rishi Chandra, Google Home, Shenaz Zack, Google Pixel and Sandeep Waraich, Pixel Wearables. Melody in Carlsbad says random photos are showing up on her Mac computer. Check the folder you're using for your screensaver: Open System Preferences, Screen Saver, Photos and check the library or folder. Elsa in Playa Del Rey wants to use DIRECTV Stream but it doesn't work with Samsung. Robert is trying to make his DIRECTV Genies tune to a certain sports game at a certain time. California will soon let you add your Driver's License and ID to Apple Wallet. Max Tegmark of the Future of Life Institute will talk about the good and bad of AI. Proton VPN now has a browser extension and it's completely free. There's a new world record for most consoles hooked up to one TV: 444. Dylan from St. Louis wrote in to say how much he likes the discount gift card website GCX, formerly Raise. Rich DeMuro talks about tech news, tips, and gadget reviews and conducts interviews in this weekly show. Airs 11 AM - 2 PM PT on KFI AM 640 and syndicated on 350+ stations nationwide. Stream live on the iHeartRadio App or subscribe to the podcast. Follow Rich on X, Instagram and Facebook. Call 1-888-RICH-101 (1-888-742-4101) to join in! Links may be affiliate. RichOnTech.tv See omnystudio.com/listener for privacy information.
Petit tour d'horizon des métiers les plus communs de la cyber et leurs interactions.Les émissions sont enregistrées en live sur Twitch et redifusée sur Youtube avant de devenir des Podcast.Venez assister à l'enregistrement en live !Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations.
Big thank you to Proton for sponsoring this video. Get Proton VPN using my link: https://davidbombal.wiki/protonvpn5 // Phillip's SOCIAL // X / Twitter: https://twitter.com/PhillipWylie Website: https://www.thehackermaker.com/ Linktree: https://linktr.ee/phillipwylie LinkedIn: https://www.linkedin.com/in/phillipwylie YouTube: https://www.youtube.com/c/phillipwylie // Books MENTIONED // The Pentester Blueprint by Phillip Wiley and Kim Crawley https://amzn.to/41N5CBl The Hacker Playbook by Peter Kim https://amzn.to/40LvInc The Hacker Playbook 2 by Peter Kim https://amzn.to/3oVemqr The Hacker Playbook 3 by Peter Kim https://amzn.to/40SjokN The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard https://amzn.to/3oLN5Xv Hacking API's by Cori Ball https://amzn.to/3Hi5amj Penetration Testing A Hands-On Introduction to Hacking by Georgia Weidman https://amzn.to/3Hi5zF RTFM (Read Team Field Manual) by Ben Clark and Nick Downer https://amzn.to/3Vf0XWs Operator Handbook Red Team + OSINT + Blue Team by Joshua Picolet https://amzn.to/41JTQYH Black Hat GraphQL by Nick Aleks and Dolev Farhi: https://amzn.to/47I8zpT // Videos MENTIONED // Pentester Blueprint: Your road to success: https://youtu.be/-FjL8y3B08k Free Hacking API course!: https://youtu.be/CkVvB5woQRM // YouTubers mentioned // Rana Khalil: https://www.youtube.com/@RanaKhalil101 Profesor Messer: https://www.youtube.com/@professormesser She Networks: https://www.youtube.com/@shenetworks Tib3rius: https://www.youtube.com/tib3rius // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb X / Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/@davidbombal // Menu // 00:00 - Coming Up 01:51 - Sponsored segment 03:35 - Intro 04:11 - Blackhat 06:43 - Try Hack Me / Hack The Box 08:35 - Roadmap in 2024 14:30 - Do You Need Certifications? 18:07 - Problems Getting a Job 20:16 - CCNA or Network+? 23:34 - Certifications & Degrees 27:43 - Roadmap for Developers 30:33 - Using BugBounty for Experience 32:40 - What Should you Focus on in 2024? 36:12 - A.I in 2024 41:12 - Modern Day Opportunities 42:02 - Books For 2024 44:58 - Last Advice 50:03 - You're Never Too Old 52:14 - Different Roles 54:00 - Phillip's regrets 57:33 - Outro // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com pentest pentester hack hacker hacking ethical hacking ethical hacker course ethical hacker Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacker #pentester #hack
https://www.yourcyberpath.com/112/ In this episode, Kip and Jason jump into answer questions directly from our listeners! We share valuable advice and insights into starting and advancing in the cybersecurity field by addressing ways to overcome some common challenges such as imposter syndrome, applying skills from diverse industries, and filling employment history gaps. Further, you will get some guidance on gaining relevant experience, understanding job roles, tackling age bias, and displaying self-confidence to potential employers. We will then culminate with some valuable tips on overcoming technical skill gaps and making successful career transitions, alongside with coverage of the HIRED course and its transition from a high-cost masterclass to a more accessible Udemy course that anyone can participate in. How do I get started in cybersecurity?How can I gain experience?How to I transition into cybersecurity later in life?How do I identify my desired job and current transferrable skills?How should I address a gap in my resume?How can I deal with imposter syndrome? Relevant websites for this episode Akylade Certified Cyber Resilience Fundamentals (A/CCRF)Your Cyber PathIRRESISTIBLE: How to Land Your Dream Cybersecurity PositionThe Cyber Risk Management Podcast Other Relevant Episodes Episode 90 - How to Get Your First Job as a Pentester with Chris HornerEpisode 45 - Live Resume ReviewEpisode 24 - How to Navigate a Skill GapEpisode 66 - How to Be Irresistible to Hiring Managers
Hello and welcome back to USB our Guest, Cyber Security tips. I'm Theo, here to help you break down cyber security news and hacks and how they affect you. However, today I am interviewing Zoogs. He has been in the industry for a bit now and I wanted to pick his brain on a variety of topics. We decided to record this live on twitch with chat using text to speech, while in Minecraft and recording audio in discord. So If you want to watch the VOD it is available on twitch or YouTube. We talk about his prior experience, current role, their expectations and what it took for him to get into that role. We also talk about Certificates, different learning techniques, the importance of stepping outside of your comfort zone, and advice that he wish he knew when he started on his path in cybersecurity. I include some sleeper questions that really don't have anything to do with cyber security And zoogs triggers himself @ 44:45!! https://linktr.ee/b7h30 --- Send in a voice message: https://podcasters.spotify.com/pod/show/usbog/message
Cybersecurity professionals come from all walks of life, and true professionals find ways to improve their skill sets at each step of the journey. Pentester and Security Consultant Joseph Pierini (CISSP, CISA, PCIP) sat down with Host and Principal Security Analyst Jen Stone (MCIS, CISSP, CISA, QSA) at PCI Community Meeting North America to discuss:His unique entry into cybersecurityHow he continually found non-traditional ways to forge forward in his careerHow introspection and communication make him a better technology professionalHosted by Jen Stone, Principal Security Analyst (MCIS, CISSP, CISA, QSA)[Disclaimer] Before implementing any policies or procedures you hear about on this or any other episodes, make sure to talk to your legal department, IT department, and any other department assisting with your data security and compliance efforts.
In our latest PowerShell Podcast, we had an insightful discussion with Miriam Wiesner, a renowned Senior Security Researcher at Microsoft and the author of "PowerShell Automation and Scripting for Cybersecurity." Miriam, who is juggling her roles as a security expert, an author, and a mom, shed light on her journey at Microsoft, talking about the ups and downs she faced. She extended the conversation to her book-writing experience, wherein she balanced work-life pressures to deliver this authoritative guide on PowerShell Automation and Scripting. The discourse was particularly intriguing when it delved into PowerShell security - an area Miriam is so passionate and knowledgeable about. There was certainly so much to learn from our discussion with her! Bio: Miriam C. Wiesner is a Sr. Security Researcher at Microsoft with over 15 years of experience in IT and IT Security. She has held various positions, including Administrator/System Engineer, Software Developer, Premier Field Engineer, Program Manager, and Security Consultant and Pentester. She is also a renowned creator of open-source tools based in PowerShell, including EventList and JEAnalyzer. She was invited multiple times to present her research behind her tools at many international conferences like Black Hat (USA, Europe & Asia), PSConf EU, MITRE ATT&CK workshop, and more. Miriam is the author of the book "PowerShell Automation and Scripting for CyberSecurity: Hacking and Defense for Red and Blue Teamers." Outside of work, Miriam is a dedicated wife and mother, residing with her family near Nuremberg, Germany. See The PowerShell Podcast on YouTube: https://www.youtube.com/watch?v=0Csw8YYGyCg https://github.com/HCRitter/PSMermaid https://github.com/HCRitter/PSCommandShortener https://devblogs.microsoft.com/powershell/psresourceget-release-candidate-is-now-available/ https://github.com/DevClate/365AutomatedLab https://www.joshooaj.com/blog/2023/09/06/debugging-convertto-json/ https://twitter.com/miriamxyra/status/1697195685068575222?s=46&t=AofiiK_18fgZEoSxIrqhAA https://twitter.com/miriamxyra https://github.com/PSSecTools/JEAnalyzer https://packt.link/MiriamCW https://github.com/PSSecTools/JEAnalyzer https://github.com/miriamxyra/myDeckWishlist https://github.com/miriamxyra/EventList
This week Ryan and Shannon are on a well-deserved break. Please tune in all week to listen to our Top 5 downloaded episodes. Here is our fourth-most downloaded show: Hello and welcome to a very special episode of Ask A CISSP. On this week's podcast, I had the pleasure of speaking to Ms. Metisha 'Tish' Harper. Tish is a mother, baker, and future "badass" Pentester with questions ranging from "How to break into the industry with her CySA+ and no experience?" to "What tools she should learn before applying for different positions in her field". Tish's passion for cyber and her future in it will motivate you no matter what part of the journey you are on. This is an episode you won't want to miss! I am a Certified Information Systems Security Professional, CISSP for short, and I want to answer your questions about starting a career in cybersecurity and information technology. Really, anything cyber-related. So please, ask away! I also have a daily podcast where I and my two phenomenal co-hosts discuss the latest in cybersecurity news and highlight those movers and shakers and glass ceiling breakers. Those People of Color who have made it to the other side of the proverbial firewall to those C-suite and senior leadership positions in Cybersecurity and IT. Please LISTEN
In episode 62 of Cybersecurity Where You Are, co-host Sean Atkinson sits down with Chris Elgee, Senior Security Analyst at Counter Hack; and Erik Pursley, Technical Engineer at Counter Hack. Together, they discuss the "spidey sense" that goes into being a penetration tester. They reflect on key skills and certifications that help to make a successful pentester, review some of the methodologies that go into pentesting, and consider how specialization might be inevitable in an evolving technology landscape. They conclude by offering advice to organizations that are looking to engage in a pentest.ResourcesFollow Chris and Erik on LinkedInCounter HackA CISO's Best Friend: The PentesterEpisode 59: Probing the Modern Role of the PentestEpisode 49: Artificial Intelligence and CybersecurityEpisode 55: Live at RSA Conference 2023If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
Google Cloud Security Assessment from a pentester's lens. Anjali from NotSoSecure will be sharing her research into Google Cloud IAP & finding ways to assess the use of Google Cloud IAP in your environment and what are some of the low hanging fruits that you can remove today to reduce any potential risk from the service to your Google Cloud environment. Episode YouTube Video Link Host Twitter: Ashish Rajan (@hashishrajan) Guest Socials: Anjali S's Linkedin (Anjali S) Podcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - Cloud Security Newsletter - Cloud Security BootCamp Spotify TimeStamp for Interview Questions A word from our sponsors - you can visit them on snyk.io/csp (00:00) Introduction (04:31) A bit about Anjali Shukla (05:23) What is GCP IAP? (07:18) Why is IAP so important? (09:55) IAP and Identity Federation (11:34) SSH vs Jump Box (13:57) GCP IAP vs AWS Cognito (16:22) Misconfigurations in GCP IAP (23:17) Potential security scenarios (25:45) Cloud Security Assessment in GCP (28:13) Doing your own cloud security assessment (30:49) The Fun Questions See you at the next episode!
In this episode Spencer, Darrius and Tyler get together for a round-table discussion on sharpening your sword as a pentester. They discuss what they do to keep improving, upping their skill and honing their craft. Spoiler, it's not just the technical aspects of pentesting that are important to work on.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://twitter.com/cyberthreatpovWork with Us: https://securit360.com
Want to become a Pentester rather than a Thintester? Want to find out what a Thintester even means? In this episode of the SecureAF Podcast, Alias CEO Donovan Farrow and CISO Jonathan Kimmitt discuss one of our often-asked questions: What do I need to do to become a Pentester? They'll talk about what qualities and experiences prepare you for the role (you might be surprised!) and why knowing the why more than just the what of how to use tools and leverage exploits matter. Watch the full video at youtube.com/@aliascybersecurity.Catch the whole episode now at secureafpodcast.comListen on Apple Podcasts, Spotify and anywhere you get you're podcasts.
A discussion with ITAL members Eric Brown and Scott Rysdahl with Micah Kryzer. Micah is a pentester by day but also works alongside the ITAL team. In this episode the crew overviews certificates, a big topic that transcends any one vendor or environment. Certificates are like an electronic passport meant to uniquely identify a person, computer or application on a network. This specific family of vulnerabilities discussed affects the Microsoft Active Directory certificate services, which is Microsoft's own built-in PKI or public key infrastructure included with Window's servers and domains. Micah walks us through a pentest demo illustrating the ways this system can be exploited as well as providing tips on how to protect business networks from this attack.
Jayson E. Street – VP of InfoSec at SphereNY – is a hacker and pentester who has been referred to as both a “notorious hacker” and a “world-class hacker." In this episode of Cybercrime Radio, Street discusses his background in cyber, how he got involved in penetration testing for banks across the world, and more. This microcast is a short version of our full interview with Street, which you can listen to at https://soundcloud.com/cybercrimemagazine/the-world-class-hacker-robbing-banks-and-getting-paid-jayson-e-street-hacker-pentester
Guest: Nenad Zaric, CEO and Co-founder at Trickest [@trick3st]On Twitter | https://twitter.com/ZaricNenad_On LinkedIn | https://www.linkedin.com/in/nenad-zaric/Host: Phillip WylieOn ITSPmagazine
Guest: Nenad Zaric, CEO and Co-founder at Trickest [@trick3st]On Twitter | https://twitter.com/ZaricNenad_On LinkedIn | https://www.linkedin.com/in/nenad-zaric/Host: Phillip WylieOn ITSPmagazine
Learn your path to success with the man who has wrestled a bear and lived to tell the tale! Phillip not only wrestled, was a bouncer, and a whole lot more, but also become a pentester! This is your Pentester Blueprint. // Books Mentioned // The Pentester Blueprint: https://amzn.to/41N5CBl The Hacker Playbook: https://amzn.to/40LvInc The Hacker Playbook: https://amzn.to/3oVemqr The Hacker Playbook: https://amzn.to/40SjokN The Web Application Hacker's Handbook: https://amzn.to/3oLN5Xv Hacking APIs: https://amzn.to/3Hi5amj Penetration Testing A Hands-On Introduction to Hacking: https://amzn.to/3Hi5zF RTFM (Read Team Field Manual): https://amzn.to/3Vf0XWs Operator Handbook Red Team + OSINT + Blue Team: https://amzn.to/41JTQYH //Phillip's SOCIAL// YouTube: / phillipwylie Twitter: https://twitter.com/PhillipWylie LinkedIn: https://www.linkedin.com/in/phillipwylie Instagram: https://www.instagram.com/phillip.wylie/ Linktr: https://linktr.ee/phillipwylie Website: https://www.thehackermaker.com/ Podcast: https://www.itspmagazine.com/the-hack... // David's SOCIAL // Discord: https://discord.gg/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming up 01:05 - The Pentester Blueprint book // Who is it for? 03:36 - Resources about pentesting // Podcasts & walkthroughs 07:00 - From pro-wrestler to pentester 11:48 - Helping others through conferences 13:15 - Getting recruited by networking // Using social media 17:43 - How to create content 20:24 - Connecting and sharing work on Twitter 21:37 - Ignore the trolls 24:29 - Bug bounty 26:02 - Recommended certifications 30:30 - Recommended labs & VMs 34:07 - Try Hack Me & Hack The Box 35:00 - College/University degrees 36:50 - The Pentester Blueprint Formula 41:24 - Recommended books 43:26 - What is a pentester? 44:59 - Advice for anyone starting 51:05 - Final words 52:17 - Conclusion pentest pentester hack hacker hacking ethical hacking ethical hacker course ethical hacker ceh oscp hack the box try hack me ejpt ine Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacker #pentester #hack
If you want to become a Pentester in 2023, then you should get your OSCP - this is what a lot of experts I interview recommend. The Official OSCP course (PEN-200: Penetration Testing with Kali Linux) recently got updated. I interview Jeremy Miller from OffSec about the changes. Disclaimer: I was NOT paid for this interview. I wanted to make this video because it affects many of you watching and I would have done it without receiving anything from OffSec. However, they did give me access to Learn One for one year so I could see the course content. This has helped me prepare for the interview. Hopefully I'll be able to make more content covering what is in the PEN 200 course in future :) // Documentation // Changes: https://www.offsec.com/offsec/pen-200... Course: https://www.offsec.com/courses/pen-200/ // Offsec // Twitter: https://twitter.com/offsectraining Website: https://www.offsec.com/ LinkedIn: https://www.linkedin.com/company/offs... // Jeremy's SOCIAL // Twitter: https://twitter.com/JeremyHarbinger LinkedIn: https://www.linkedin.com/in/jeremy-mi... Website: https://jeremyharbinger.com/ // David's SOCIAL // Discord: https://discord.gg/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming up 00:28 - Intro 00:31 - Updated OffSec PEN-200 course for 2023 // What's changing? 05:22 - Hacking is not easy as it seems 07:46 - Preparing for the real world 10:19 - Pre-requisites for the course 14:15 - Jeremy's background // Journey to pentesting 21:13 - Approach with an open mind 22:41 - Learning models & challenges 28:10 - Feedback loop 30:16 - Buffer overflow explained 32:34 - What has been removed & added // PEN-200 updated 37:30 - What is "pedagogy"? // Changing ways to teach and learn 40:38 - The PEN-200 course and the OSCP exam 44:11 - Old and new OS available in PEN-200 course 46:04 - Things are changing but not everything 48:24 - OffSec subscriptions and contents 49:43 - Pros vs. Cons // Helping students understand 52:14 - Final words & conclusion oscp pen-200 offsec offensive sercurity pentest pentester hack hacker hacking ethical hacking ethical hacker course ethical hacker Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacker #pentester #oscp
The Code of Entry PodcastThe Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the...Listen on: Apple Podcasts SpotifySupport the show
Some Spotlight guests are right out of school, and some are entering from a different career path altogether. Our goal is to show there's no singular path into the industry, and hopefully highlight some ways more people can enter the field.Today's guest is Exton Howard, Security Analyst / Penetration Tester at Dara Security. Exton went from a career directing TV to a new career in cybersecurity. I wanted to dig into how he made the decision and managed the transition to his new career. We talk about his approach to transferable skills, which education resources he took, and his newfound passion for information security.Follow Exton on LinkedIn.
Do you want to be a pentester? Are you interested in breaking into websites and networks legally? Hear from InfoSec Pat on what it takes to enter the field, creating content, and so much more.Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Bio Links:https://cyberwarriorstudios.bio.linkConnect with our guest(s):Patrick Gorman a.k.a InfosecPatLinkedIn: https://www.linkedin.com/in/infosecpatTwitter: https://twitter.com/infosecpatPodcast Version: Available on all major platforms! (Google, Apple, Spotify, Amazon, iHeart Radio, and more)Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorPayPal: https://paypal.me/cyberwarriorstudiosCashApp: $CyberWarriorStudiosWebsite:https://www.cyberwarriorstudios.comHow to connect with Cyber Warrior:Twitch: https://twitch.tv/CyberWarriorStudiosTwitter: https://www.twitter.com/CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJfDiscord Servers:Hacker Valley Media - https://hackervalley.com/discordRaices Cyber - https://bio.link/raicescyKevTech IT - https://discord.gg/UPmXKjX2Gu***Security Happy Hour***#TheCyberWarrior#securityhappyhour#cyberwarriorstudios#wholecyberhumaninitiative#education#scholarship#MentalHealth#DontQuit#YouGotThis#cybersecurity#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#SecurityMonitoring#SecurityOnion#EnterpriseSecurityMonitoring#Cybersecurity#Infosec#Cyber#hacking#hackers#hacker#careertransitionSupport the showMerch: https://cyberwarriorstudios.com/storeYoutube: https://youtube.cyberwarriorstudios.comTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: @CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJf
In this episode of Brilliance Security Magazine's podcast, host Steve Bowcut interviews Idan Wiener and Bogdan Kortnov of Illustria about the potential risks open-source libraries pose in the context of supply chain attacks. They discuss the current state of these threats and what organizations should be aware of when it comes to open-source libraries. Wiener and Kortnov give details regarding the vulnerabilities in the ecosystem, such as the recent discovery of a popular NPM package. The episode also covers topics such as possible ways to detect malicious activities and other methods for improving security in organizations. By the end of the episode, listeners will better understand open-source library threats and how to address them. About our Guests Idan Wiener, CEO at Illustria, has vast experience in both startup and corporate environments, with exposure to international markets. He served seven years as a Captain at the Israeli Naval Academy, leading soldiers, and officers in complex classified operations. With seven years of experience in development and information security, Bogdan Kortnov, CTO at Illustria, began his career as a Pentester before progressing to developing numerous secure systems. Eventually, he became an information security architect, guiding startups and information security firms on secure architecture and development practices. Don't miss this insightful discussion with Wiener and Kortnov of Illustria! This podcast is an essential resource for anyone interested in supply chain security or learning more about open-source libraries and their risks. Tune in to the Brilliance Security Magazine podcast today and stay informed.
This is your path to becoming a Pentester in 2023. The best courses and best cert. Big thanks to Rana for answering so many of your questions! Thanks for the cool Solar Generator Jackery! Official Jackery website:: https://bit.ly/3XWNjqO Amazon Store: https://amzn.to/3IMSq8r // Rana's courses // Free Web Hacking Course: / ranakhalil101 50% OFF Web Security Academy Course Code: DavidBombal500FF Academy: https://academy.ranakhalil.com/ 8 hour SQL Injection playlist: • SQL Injection | C... // Previous video // Broken Access Control: • Free Web Hacking ... // Rana's OSCP journey // https://rana-khalil.gitbook.io/hack-t... // Book Rana Recommended // Web Application's Hacker's handbook 2nd Ed by Dafydd Stuttard: US Link: https://amzn.to/3J90wZa UK Link: https://amzn.to/3J7H2UT // TCM-Security Course Discounts and Affiliate Links // Get 25% off courses and 10% off PNPT with coupon code: BOMBAL2023 Practical Ethical Hacking: https://davidbombal.wiki/tcmpeh Windows Privilege Escalation for Beginners: https://davidbombal.wiki/tcmwpe Linux Privilege Escalation for Beginners: https://davidbombal.wiki/tcmlpe Open-Source Intelligence (OSINT) Fundamentals: https://davidbombal.wiki/tcmosint The External Pentest Playbook: https://davidbombal.wiki/tcmepp Movement, Pivoting, and Persistence: https://davidbombal.wiki/tcmmpp Python 101 for Hackers: https://davidbombal.wiki/tcmpython Linux 101: https://davidbombal.wiki/tcmlinux Practical Malware Analysis & Triage: https://davidbombal.wiki/tcmmalware Mobile Application Penetration Testing: https://davidbombal.wiki/tcmmobile Python 201 for Hackers: https://davidbombal.wiki/tcmpython201 Practical Web Application Security & Testing: https://davidbombal.wiki/tcmweb Practical Windows Forensics: https://davidbombal.wiki/tcmwinforensics GRC Analyst Master Class: https://davidbombal.wiki/tcmgrc // TCM-Security Certifications // https://certifications.tcm-sec.com/?r... If you are current/former military, students, teachers, and first line responders (doctors, nurses, EMTs, etc.) you can get 20% off TCM certifications. Email support@tcm-sec.com for that discount if you qualify. // Tib3rius courses // - Windows Privilege Escalation: https://www.udemy.com/course/windows-... - Linux Privilege Escalation (Tib3rius): https://www.udemy.com/course/linux-pr... // IPsec // Recommended YouTube channel: / @ippsec // Rana's SOCIAL // Twitter: https://twitter.com/rana__khalil Academy: https://academy.ranakhalil.com/ Youtube Channel: / ranakhalil101 Medium Blog: https://ranakhalil101.medium.com/ Rana Intigriti Interview: • Hacker Heroes #5 ... // David's SOCIAL // Discord: https://discord.gg/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com pentest pentester hack hacker hacking ethical hacking tcm security web web hacking web hacking course web hacking tutorial xss owasp owasp top 10 cross site scripting portswigger kali linux install kali linux 2022 ethical hacker course ethical hacker Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacker #pentester #hack
Guest: Christian Espinosa, CEO at Blue Goat Cyber [@bluegoatcyber]On Twitter | https://twitter.com/IronracerOn LinkedIn | https://www.linkedin.com/in/christianespinosa/Host: Phillip WylieOn ITSPmagazine
Guest: Christian Espinosa, CEO at Blue Goat Cyber [@bluegoatcyber]On Twitter | https://twitter.com/IronracerOn LinkedIn | https://www.linkedin.com/in/christianespinosa/Host: Phillip WylieOn ITSPmagazine
Schon unter 20 Euro bekommt man ein Hacking-Gadget, die interessanten kosten um 100 Euro. Im Podcast c't uplink stellen wir einige vor und beschreiben, welche vielen verschiedenen Arten von Hacks und Tricks sie beherrschen. Auch die rechtliche Seite kommt zur Sprache: Was darf ich besitzen, was darf ich anwenden, was darf ich für Pentests beispielsweise in der eigenen Firma ausprobieren? Die dazu passende Titelgeschichte "Hacking-Gadgets" erscheint in c't 5/2023. Als Gäste im Podcast-Studio sind dabei: Ronald Eikenberg, Autor der Titelgeschichte, Tobias Scheible, Sicherheitsforscher mit besonderem Faible für die angriffslustigen Geräte und Joerg Heidrich, Datenschutzbeauftragter und Justiziar des Heise Verlags. https://www.heise.de/select/ct/2023/5 Einige der Gadgets ermöglichen einen Angriff aufs WLAN von außen, indem sie auf Knopfdruck alle angemeldeten Geräte aus dem WLAN werfen und dazu bringen, sich an einem Fake-Router anzumelden. Wir erwähnen Tipps, wie man sein WLAN gegen solche Angriffe schützt. Andere Gadgets hören auf beispielsweise von Smart-Home-Geräten genutzten Frequenzen mit -- klingt nach einem harmlosen Mitlesen des Thermometers des Nachbarn, aber ermöglicht Bewegungsprofile von den Fahrzeugen zu erstellen, deren Reifenventile per Funk vor Platten warnen. Eine große Gefahr geht von den Hacking-Gadgets aus, die Angreifer an einen PC anschließen: Die Kästchen tarnen sich als USB-Sticks oder LAN-Adapter und sind in der Lage, Daten zu klauen, Passwörter mitzulesen oder den gesamten PC zu übernehmen. Andere zerstören den PC einfach. Wir zeigen einige Modelle, erklären deren Möglichkeiten und entwerfen Schutzmaßnahmen. Der wohl wichtigste Schutz ist, die Mitarbeiter zu sensibilisieren: Eines der gefährlichsten Gadgets, das Tastatureingaben mitliest und per WLAN verschickt, könnten auch wir nicht von einem harmlosen USB-Kabel unterscheiden. Wichtig ist auch, bestehende Sicherheitsstandards zu implementieren: Ein Hacking-Gadget kopiert RFID-Karten, die vielerorts als Zugangsschutz dienen -- und das gelingt nur, wenn der Ausgeber der Karten einige schützende Maßnahmen vergisst. Wir haben das direkt mit der Heise-Zugangskarte ausprobiert -- puh, glücklicherweise ließ sie sich nicht kopieren. Ein weiteres Gadget zeigt, ob der NFC-Chip beim Smartphone wirklich ausgeschaltet ist. Mit dabei: Ronald Eikenberg, Joerg Heidrich und Tobias Scheible
https://www.yourcyberpath.com/90/ In this episode our host Jason Dion goes over the very exciting topic of how to get your first job as a Pentester with Chris Horner, banking expert turned Security engineer and Penetration tester and together they go through Chris's background, how he got into banking and why he made the switch to Cybersecurity. Chris discusses his transition story and how it's not the cliche zero to hero in 90 days, explaining that it took him a long time to transition where he is today, highlighting that his networking experience and soft skills were a huge aid on his job hunting journey. Jason then shares his opinion on Chris's journey highlighting many important parts, like how to deal with time limitations during your studies and how to choose the right path to start you Cyber career. Chris then shares his experience with the eJPT certification exam and how he was able to pass it, giving us examples of the training he used and how he prepared for it. Then Chris and Jason go over Chris's Job responsibilities and how he goes about every one of them, what he enjoys, what he finds tedious and what parts of the job he finds challenging. In the end Jason and Chris discuss the hiring process from two different perspectives, the hiring manager perspective and the applicant perspective discussing the different challenges that both people go through. What You'll Learn ● How important are soft skills for someone in the cybersecurity industry? ● How to choose the right certifications to start your pentesting career? ● What is the eJPT test like? ● What is it like working as a Pentester? ● How long does it take to get your first Job in Pentesting? ● How to fight self doubt and continue your cyber career journey? Relevant Websites For This Episode ● https://www.offensive-security.com/labs/ ● https://www.vulnhub.com/ ● https://ctftime.org/ ● https://www.linkedin.com/ in/chrismhorner/ ● https://www.diontraining.com/courses Other Relevant Episodes ● Episode 82 - From Truck Driver to Cybersecurity Analyst with Mike Hillman ● Episode 79 - Mid-Career Transition Success Story with Steve McMichael ● Episode 76 - Which Certification Roadmap Or Path Should I Use?
In this episode of the We Hack Purple Podcast we meet Gemma Moore , co-founder and director of Cyberis. Gemma is an expert in penetration testing and red teaming. She started her career in cyber security nearly twenty years ago, working her way up from a junior penetration tester to running the penetration testing practice in a specialist consultancy by 2011. She is a founding director of the information security consultancy, Cyberis.Over her career, she has held CREST certifications in Infrastructure, Applications and Simulated Attack, and now focuses most of her efforts on planning, running and executing red team and purple team exercises.In recognition of her outstanding level of commitment to the technical information security industry and the highest level of excellence in CREST examinations, Gemma was selected to receive a lifetime CREST Fellowship award in 2017. Gemma was a contributing author to the BCS' “Penetration Testing: A guide for business and IT managers” Gemma was named “Best Ethical Hacker” in the 2018 Security Serious Unsung Heroes industry awards, and has been honoured by SC Magazine as one of its 50 Most Influential Women in Cybersecurity, and by IT Security Guru magazine as one of its Most Inspiring Women in Cyber. We talked about everything to do with Red Teaming and PenTester, especially what the difference was between the two, risks involved, setting scope, and several funny and scary stories! We also talked about what people are trying to achieve with a red teaming exercise, and how things can go terribly wrong when we blame everything on the user. This was through and through a fantastic conversation.You can learn more by reading in Gemma's blog!Thank you so much to our sponsor, Bright! Check out their amazing #DAST! https://brightsec.com/Join us in the We Hack Purple Community: A fun and safe place tolearn and share your knowledge with other professionals in the field.Subscribe to our newsletter! Find us on Apple Podcast, Overcast + Pod#TanyaJanca #SheHacksPurple #AppSec #CyberSecurity
Ready to hear all about the HTB Academy & using it to become a certified penetration tester? Come listen to our two amazing academy folk tell you all about it :) Don't want to miss any HTB updates? Follow us on social media or join our Discord server: discord.gg/hackthebox
Tanja's story started in a computer science family in the 70s, where Tanja fell in love with computers. She spoke about programming in high school, coming out of college during the DotCom bubble, and learning best practices of software engineering she had never learned during her early self-studies. We then spoke about the role communities, and lunch&learn activities played in her career. She described how penetration testing and security slowly made their way into her life. Tanja explained how she discovered the OWASP community and embraced public speaking. And finally, we spoke about creating We Hack Purple, the effects of learning cybersecurity when you are a developer, and much more.Here are the links from the show:https://www.twitter.com/shehackspurple/https://shehackspurple.ca/https://newsletter.shehackspurple.cahttps://wehackpurple.comhttps://aliceandboblearn.com/https://www.linkedin.com/in/tanya-janca/https://zerodayreapers.bandcamp.com/track/heartbleedhttps://www.facebook.com/tanya.janca/ CreditsCover Heliotrope by Blue Dot Sessions is licensed CC BY-NC-ND 4.0.Your host is Timothée (Tim) Bourguignon, more about him at timbourguignon.fr.Gift the podcast a rating on one of the significant platforms https://devjourney.info/subscribeSupport the show
In this episode, Cybr community member Eric Gimbel walks us through step-by-step how he landed a Junior Penetration Tester job without having prior cybersecurity or IT experience. If you've ever been told “you need help desk experience first” or “you need 5+ years in IT before you can apply” then you need to listen to this episode, because our guest did neither of those to land his Pentester job, and he gives you a step-by-step framework so you can do it too.
In order to stay relevant and up-to-date with new techniques and tools, it requires a certain amount of focus day after day, week after week, year after year. That focus being constant improvement. If we, as pentesters, don't get better, we can't help businesses defend better.So that's what this podcast is about. Constant improvement and showing that off to the world. We are going to talk about WHY you would want to show off your skills as a pentester as well as 7 awesome ways to do just that, show off your skills as a pentester.Read the associated blog post here: https://offsec.blog/7-awesome-ways-to-show-off-your-skills-as-a-pentester/Blog: https://offsec.blog/Youtube: https://www.youtube.com/channel/UCCWmudG_CTNAFBaV48vIcfwTwitter: https://twitter.com/cyberthreatpovWork with Us: https://securit360.com
Here are my thoughts on how to start your journey into the world of web penetration testing. This journey isn't for the weak. If this is something you truly want, then be prepared to fully embrace a mindset of constant learning, curiosity, and tenacity.The focus of this episode is on getting into the right mindset, while choosing which technologies you should start to learn. I will have a follow-up episode on how to become a web penetration tester from a professional development perspective. Episode Flow0:00 - Intro1:16 – The Hacker's Mindset3:25 – Learn These Core Technologies 6:52 – Start Hacking Now These are the sites where you can start to practice website hacking:HackThisSite.org, TryHackMe.com,and HackTheBox.comFeedback, questions, or requests? Want to join the Security+ Discord?You can reach out here: https://www.tekordie.com/contact/Don't forget, TEK or DIE is onApple Podcasts,Spotify,Google Podcasts, and most podcast directories. Subscribe so you can get the show sent to you automatically.
Jennifer an Air Force vet, mom, and electrical engineer shares her journey into offensive security.Jennifer shares her struggles starting a career in offensive security. Not only is she a mother of two and she is the mother of a neurodiverse son. Jennifer tells how she used a targeted approach to networking and job hunting._______________________GuestJennifer BatePenetration Tester - Solution Consultant at Deloitte [@Deloitte]On Twitter | https://twitter.com/jenbattlesOn LinkedIn | https://www.linkedin.com/in/jenniferbate/______________________HostPhillip WylieOn ITSPmagazine
Jennifer an Air Force vet, mom, and electrical engineer shares her journey into offensive security.Jennifer shares her struggles starting a career in offensive security. Not only is she a mother of three and she is the mother of a neurodiverse son. Jennifer tells how she used a targeted approach to networking and job hunting._______________________GuestJennifer BatePenetration Tester - Solution Consultant at Deloitte [@Deloitte]On Twitter | https://twitter.com/BateJenniferOn LinkedIn | https://www.linkedin.com/in/jenniferbate/______________________HostPhillip WylieOn ITSPmagazine
Christoff's professional career includes Unix and Linux administration, and software development, but his passion was hacking.Christoff shares how he pivoted from a system engineer during difficult COVID times. During his education journey to become a pentester he earned the OSCP certification. His networking skills paid off and helped him land a pentesting job._______________________GuestChristoff HumphriesAdversarial Analyst (Pentester) at CyberOne SecurityOn Twitter | https://twitter.com/sogonsecOn LinkedIn | https://www.linkedin.com/in/christoffhumphries/______________________HostPhillip WylieOn ITSPmagazine
Christoff's professional career includes Unix and Linux administration, and software development, but his passion was hacking.Christoff shares how he pivoted from a system engineer during difficult COVID times. During his education journey to become a pentester he earned the OSCP certification. His networking skills paid off and helped him land a pentesting job._______________________GuestChristoff HumphriesAdversarial Analyst (Pentester) at CyberOne SecurityOn Twitter | https://twitter.com/sogonsecOn LinkedIn | https://www.linkedin.com/in/christoffhumphries/______________________HostPhillip WylieOn ITSPmagazine
Alex endured a lot of hardships including abusive family life but overcame them to become a web app pentester.Alex's hardships stemmed from an abusive family life. He was homeless and he dropped out of high school, but he had an escape through technology and gaming. Self taught he went on to educate himself, and get employed in IT. He now works as a web app pentester._______________________GuestAlex AwadWeb App Pentester at UndisclosedOn Twitter | https://twitter.com/WisdomOfRageOn LinkedIn | https://www.linkedin.com/in/alex-awad-0310091b3/______________________HostPhillip WylieOn ITSPmagazine
Christian shares how he went from a sysadmin to a penetration tester.Christian started his career as a system administrator for a small Texas school district, but his curiosity and ambition led him becoming a pentester._______________________GuestChristian GonzalezPenetration Tester at US BankOn Twitter | https://twitter.com/ch0mpaaOn LinkedIn | https://www.linkedin.com/in/christian-gonzalez-672104160/______________________HostPhillip WylieOn ITSPmagazine
Kirk was an aspiring electrician with a passion for BJJ. Kirk's career path changed multiple times before finding the career of pentester.Kirk share's his story of hard work, discipline and sacrifice, which eventually paid off and landed him in a pentester role. Pentesting wasn't his first or second choice, but one his is very passionate about._______________________GuestKirk Wah YickSenior Information Security Specialist/Penetration Tester @ US Bank (@usbank)On Twitter | https://twitter.com/KirkWahYickOn LinkedIn | https://www.linkedin.com/in/kirk-wah-yick-aa262a4b/______________________HostPhillip WylieOn ITSPmagazine
Emily's career started in tech support but she found her niche in the pentesting discipline.Emily's experience started in tech support, but her career evolved into cybersecurity, DevOps, DevSecOps, and finally, she found her passion in pentesting._______________________GuestEmily LiuOn Twitter | https://twitter.com/ASN_Sinanju_06SOn LinkedIn | https://www.linkedin.com/in/emily-liu-74a0b6140/______________________HostPhillip WylieOn ITSPmagazine
Michael worked cleaning pools, but he got frustrated and was very unhappy. He changed his focus to something computer-related and educated himself to make a career move.During Michael's college education a professor told him that he had the mindset to become a pentester. Excited at the potential his professor saw in him, he proceeded to research and educate himself in the role of pentester._______________________GuestMichael PadrickOn Twitter | https://twitter.com/FearlessSecOn LinkedIn | https://www.linkedin.com/in/michael-padrick-384745150/______________________HostPhillip WylieOn ITSPmagazine