eLearnSecurity sat down with Mari Gallow, CEO of Women’s Society of Cyberjutsu to discuss her experiences in cyber security and how to make strides toward a more inclusive industry.
Mari Galloway is currently a Senior Security Architect located in Las Vegas, Nevada, but her cyber security career wasn’t always guaranteed.
Welcome to the second episode of Cyber Insecurity, eLearnSecurity’s weekly show on all things cyber security. You can check us out on YouTube or on INE’s The IT Experts Network wherever you listen to podcasts.
This week Neal Bridges, Jeff Golz and Matt Kreisher tackle a number of topics related to the increased threat landscape due to COVID-19.
Welcome to eLearnSecurity’s Cyber Insecurity, a new show dedicated to the latest InfoSec news. Every week, cyber experts Neal Bridges and Jeff Golz join eLearnSecurity’s Matt Kreisher to discuss what businesses need to know about the latest events in cyber security.
The goal of fingerprinting a network is to find out what operating systems and services are running and potentially find a way into the network through those internet facing systems.
eLearnSecurity Launches Version 2 of Penetration Testing eXtreme
On Tuesday, June 23, eLearnSecurity released the latest version of Penetration Testing Extreme, our most advanced pentesting course. We overhauled PTXv2 to address modern TTPs, especially regarding Active Directory attacks. Our course designers have also created 100+ hands-on red teaming challenges spread across 11+ attack scenarios in our industry leading labs.
So far, the Fingerprinting section of our Pentesting 101 series has shown scans originating from a personal network. That isn’t always ideal in some situations. While following the attack methodologies found in the APT-1 report, Mandiant did not talk about APT-1 doing any type of scanning or fingerprinting.
Announcing eLearnSecurity’s Red Team Month Discount
We here at eLearnSecurity have been beating the dead horse about cyber security skills shortage for quite a while now. Why? According to CoreSecurity’s 2020 Penetration Testing Report, 47 percent of businesses have not pentested their network.
Since we are trying to paint a picture of the target network, saving the nmap output would help. The command line switch “-oA” will output the results of a nmap scan to XML, a grepable format and plain text like you’d see on the screen.
Malware and Web Application Security and Phishing OH MY!
eLearnSecurity Launches Malware Analysis Professional Course
eLearnSecurity officially launched our latest cyber security training course, Malware Analysis Professional (MAP) on May 19. As malware continues to plague modern industry, many organizations struggle to comprehend the effects of an attack, where the vulnerability started and the consequences of such a breach.
eLearnSecurity sat down with Stephanie Ihezukwu, known online as Steph and Sec. She serves as a Lead for WoSEC Houston and served as lead for WISP at last year’s DefCon. She speaks at security conferences on various topics. She co-hosts a “happy hour” inspired podcast called Coolest Nerds in the Room, where she leads conversations based on the lives of people in tech.