Chapter
Clips
The speaker describes playing in a physical representation of a corporate network against cybersecurity professionals in a Capture the Flag game, which was like a mockup of a development and production environment.
27:13 - 30:23 (03:09)
Summary
The speaker describes playing in a physical representation of a corporate network against cybersecurity professionals in a Capture the Flag game, which was like a mockup of a development and production environment.
ChapterNetwork Security Testing
Episode83: NSA Cryptologists
PodcastDarknet Diaries
The podcast hosts discuss a cybersecurity training program that involved real-life scenarios such as accessing a campus network and utilizing span ports and intrusion detection systems on the fly.
30:23 - 32:18 (01:55)
Summary
The podcast hosts discuss a cybersecurity training program that involved real-life scenarios such as accessing a campus network and utilizing span ports and intrusion detection systems on the fly.
ChapterNetwork Security Testing
Episode83: NSA Cryptologists
PodcastDarknet Diaries
The first edition of a free IT security book was able to generate thousands of downloads, with a lot of donations provided towards different organizations.
32:22 - 34:34 (02:11)
Summary
The first edition of a free IT security book was able to generate thousands of downloads, with a lot of donations provided towards different organizations.