Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Introduction
00:00 • 2min
Is the Access Real or Fake?
02:04 • 2min
Social Engineering
04:12 • 2min
Security Oftice - Why Do I Want One?
06:01 • 2min
Is There a Pen Tester?
08:15 • 2min
Getting Credibility to the Element, Persuading Leadership
10:15 • 2min
Pentesting as Part of an Audit
11:52 • 2min
The Flood Attack Detection Strategy Worked Well, Right?
13:53 • 3min
The Humanitarian Tool Box
16:32 • 3min
How to Find a Good Auditor?
19:56 • 3min
How to Make a Successful Infrastructure Proposal?
22:49 • 2min
Getting a Sample Appentis Report
24:30 • 2min
How to Test a Fishing Attack?
26:27 • 2min
How Do I Move Backwards?
28:05 • 2min
Hacker's Working on Your Data
30:28 • 2min
How Do You Close the Door?
32:05 • 2min
Is It a Speed Thing?
34:09 • 3min