Van Wyk: Take Steps to Protect Yourself as a Consumer
With all the digital threats we face on a daily basis, it's a miracle we haven't all been hacked. To ensure the odds are in your favor...
Beaver: Learning the Right Lessons from ExpensiveWall Android Malware
If you're in charge of information security, you may not be able to control every user and every device in your environment, but you can...
Van Wyk: Doing Your IR Planning the Right Way
In light of the Equifax breach, organizations need to re-examine their incident response planning to ensure similar crises are handled...
April 18, 2017 | Penetration Testing and Red TeamingBy Dave Kennedy, IANS Faculty
Penetration testing has been given quite a few names over the past few years, including everything from “vulnerability scanning” all the way to “targeted and direct attacks” against organizations. This comes as attacker techniques themselves are shifting based on organizations adding more detection capabilities into their environments. In this webinar, IANS Faculty Dave Kennedy dives into some of the latest attack vectors and discusses why adversarial simulations are some of the most effective methods for building defenses within your organization.
— CLIENT PORTAL —>
Please Login to continue
Best Practices for Working with Bug Bounty Programs
| Faculty Reports
Purple Teaming: It’s Easier Than You Think
Meet PCI Standards for Penetration Testing
| Tools & Templates
Penetration Testing Request-for-Quote (RFQ) Template