As more Department of Defense (DoD) weapon and mission support systems become software dependent and networked, government agencies are being increasingly exposed to severe cybersecurity vulnerabilities. For DoD agencies and systems integrators, who support them, understand how pentesting can help secure next generation weapons and mission support systems.
Pentesting has been around for decades, but with the technology evolution we’ve seen radical changes in today’s networks, including ubiquitous encryption, the death of the traditional network perimeter, and the advent of new end point devices, including a myriad of IoT devices.
CompTIA’s chief technology evangelist Dr James Stanger on how pentesting has morphed, and you’ll learn the relevant skills that a pen tester should have today, how organizations use a pen tester, and how to usefully “digest” information gained from a pen test.
Other topics covered include how the IT environment has changed radically in the last five years, pentesting challenges DoD agencies face today, responsible pen testing and the hacker lifecycle as well understanding the “hacker’s dilemma”. There's also a demo of responsible pentesting.
For more information on CompTIA training, visit https://www.globalknowledge.com/us-en/training/course-catalog/brands/comptia/
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
Why Pentesting is Vital to the Modern DoD Workforce
1. Why Pentesting
is Vital to the
Modern DoD
Workforce
Presented by James Stanger, PhD
Chief Technology Evangelist - CompTIA
A+, Network+, Security+, MCSE, LPI LPIC 1
Works with IT pros, managers and executives
worldwide. Over 20 years of experience in:
• Penetration testing
• Security analytics
• Risk assessment
• Intrusion detection
• Linux and open source
• Network administration
• Virtualization
• Web technologies
• Certification development
• Courseware creation
36. James Stanger, PhD
jstanger@comptia.org
+1 (360) 970-5357
Twitter: @jamesstanger
Skype: stangernet
Thank you!
My CompTIA hub:
https://certification.comptia.org/it-
career-news/hub/James-Stanger
Latest articles and blog entries:
Two sides of the same coin: Pen testing and security analytics
Penetration, persistence, and future attacks (forthcoming, Admin Magazine)
What’s hot in network certifications (NetworkWorld)
Escaping the Cybersecurity Metrics Matrix (CompTIA)
Private Eye: Open source tools for automated pen testing Admin Magazine
Thoughts about the help desk (YouTube)
The Hunt for the Meaning of the Red team (CompTIA)
The IT security disconnect (HP Enterprise)
A blockchain manifesto? A report from the RSA 2018 Blockchain Focus Group
Cloud Orchestration with Chef – Admin Magazine
No more close shaves: Talking end user security
How CIOs can optimize ITSM software (SearchCIO)
Vulnerability management: How to target bug bounty programs (TechTarget)
My career change journey: The importance of networking
The role of the service desk in the cybersecurity kill chain (HDI)
How to prevent insiders from breaching your data (Forbes)
Threat Hunting with Yara – Admin Magazine
10 critical security skills every IT team needs (interview, CIO Magazine)
How AI can help you stay ahead of cybersecurity threats (CSO Magazine)
Don’t hack me, bro! (Admin Magazine)
At the hop: Security testing with hping3 (Linux Magazine)
Editor's Notes
Typically, pen testing challenges depend upon the environment that you are investigating. Some of the challenges are technical. Many are personnel-based.
To create a fake page, you can:
Edit the hosts file or lmhosts file on a local system.
Typically, pen testing challenges depend upon the environment that you are investigating. Some of the challenges are technical. Many are personnel-based.
Typically, pen testing challenges depend upon the environment that you are investigating. Some of the challenges are technical. Many are personnel-based.
We’ve seen in both recent times and in ancient times that if real leaders don’t take action, counterfeits will.
The specific developers: Eric M. Hutchins, Michael J. Cloppert, and Rohan M. Amin
http://www.forensicsciencesimplified.org/trace/principles.html
Edmond Locard (France) – 1877 - 1966
In forensic science, Locard's exchange principle holds that the perpetrator of a crime will bring something into the crime scene and leave with something from it, and that both can be used as forensic evidence.
Companies have adopted models similar to the “kill chain concept.” This model is from Target.
We’ve seen in both recent times and in ancient times that if real leaders don’t take action, counterfeits will.