goodlisten

Clip

Penetration Testing
listen on Spotify
03:27 - 05:26 (01:58)

Learn about the role of a penetration tester and their methods for testing network security.

Similar Clips
The speaker discusses their experience of being part of three different hacker communities: the IRC channel of black hat hackers, their professional relationship with the DOD, and the Frack channel.
30:24 - 31:47 (01:22)
listen on Spotify
Hacker Community
Summary

The speaker discusses their experience of being part of three different hacker communities: the IRC channel of black hat hackers, their professional relationship with the DOD, and the Frack channel. They also explore the dynamics of infighting and trolls within the hacker community.

Chapter
Balancing Ethics and Business in Cybersecurity
Episode
114: HD
Podcast
Darknet Diaries
A CISO puts their defense in depth to the test by hiring a penetration tester to simulate a breach and reveal potential flaws in their security.
05:26 - 07:03 (01:37)
listen on Spotify
Penetration Testing
Summary

A CISO puts their defense in depth to the test by hiring a penetration tester to simulate a breach and reveal potential flaws in their security. This podcast explores the technical details of penetration testing and its importance in identifying vulnerabilities in a company's security system.

Chapter
Penetration Testing: How Hackers Break In
Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
The host expresses gratitude towards security professionals staying vigilant during the holidays and introduces a special holiday episode to celebrate the year in security.
00:00 - 02:05 (02:05)
listen on Spotify
Security
Summary

The host expresses gratitude towards security professionals staying vigilant during the holidays and introduces a special holiday episode to celebrate the year in security.

Chapter
Gratitude for Security Professionals During the Holiday Season
Episode
55: NoirNet
Podcast
Darknet Diaries
A professional hacker discusses how companies hire him to attack their computer networks or physically sneak into a building to access sensitive company information, using techniques such as hacking into networks, social engineering, and phishing.
06:46 - 09:33 (02:47)
listen on Spotify
Hacking
Summary

A professional hacker discusses how companies hire him to attack their computer networks or physically sneak into a building to access sensitive company information, using techniques such as hacking into networks, social engineering, and phishing.

Chapter
Testing Corporate Security through Penetration Testing
Episode
95: Jon & Brian's Big Adventure
Podcast
Darknet Diaries
Experts use technology to enhance their work and broaden their impact.
55:43 - 57:46 (02:03)
listen on Spotify
Security Technology
Summary

Experts use technology to enhance their work and broaden their impact. By combining human intelligence and technology, security providers can improve safety measures and reduce costs for clients.

Chapter
The Role of Humans and Technology in Cybersecurity and Healthcare
Episode
#160 - Paid Communities Making $20m+ (and How to Build One), Fighting Inertia & An Interview With Dave Selinger of Deep Sentinel
Podcast
My First Million