goodlisten

Clip

Penetration Testing
listen on Spotify
03:27 - 05:26 (01:58)

Learn about the role of a penetration tester and their methods for testing network security.

Similar Clips
A professional hacker discusses how companies hire him to attack their computer networks or physically sneak into a building to access sensitive company information, using techniques such as hacking into networks, social engineering, and phishing.
06:46 - 09:33 (02:47)
listen on Spotify
Hacking
Summary

A professional hacker discusses how companies hire him to attack their computer networks or physically sneak into a building to access sensitive company information, using techniques such as hacking into networks, social engineering, and phishing.

Chapter
Testing Corporate Security through Penetration Testing
Episode
95: Jon & Brian's Big Adventure
Podcast
Darknet Diaries
Experts use technology to enhance their work and broaden their impact.
55:43 - 57:46 (02:03)
listen on Spotify
Security Technology
Summary

Experts use technology to enhance their work and broaden their impact. By combining human intelligence and technology, security providers can improve safety measures and reduce costs for clients.

Chapter
The Role of Humans and Technology in Cybersecurity and Healthcare
Episode
#160 - Paid Communities Making $20m+ (and How to Build One), Fighting Inertia & An Interview With Dave Selinger of Deep Sentinel
Podcast
My First Million
Two individuals discuss their different skill sets in the realm of exploiting devices and modifying hardware, which leads to insights on the process and issues with patience.
53:16 - 55:05 (01:48)
listen on Spotify
Hacking
Summary

Two individuals discuss their different skill sets in the realm of exploiting devices and modifying hardware, which leads to insights on the process and issues with patience.

Chapter
Finding Zero-Day Vulnerabilities with Pedro and Petra
Episode
82: Master of Pwn
Podcast
Darknet Diaries
The possibility of hackers planting sneaky USB devices in offices is not unheard of.
2:30:43 - 2:33:53 (03:09)
listen on SpotifyListen on Youtube
Cybersecurity
Summary

The possibility of hackers planting sneaky USB devices in offices is not unheard of. A simple key-logging device can be inserted into a workplace and grant unlimited access to sensitive data.

Chapter
Cybersecurity Risks and Low Hanging Fruit
Episode
#340 – Chris Tarbell: FBI Agent Who Took Down Silk Road
Podcast
Lex Fridman Podcast
In this episode, The Dark Rose, Jack Recyder, and Damien discuss the legality of ethical hacking and the consequences of publicly disclosing vulnerabilities without permission.
45:20 - 47:22 (02:02)
listen on Spotify
Ethical Hacking
Summary

In this episode, The Dark Rose, Jack Recyder, and Damien discuss the legality of ethical hacking and the consequences of publicly disclosing vulnerabilities without permission.

Chapter
Ethical Hacking and the Responsibility of Finding Vulnerabilities
Episode
Ep 49: Elliot
Podcast
Darknet Diaries