Red Team and Bug Bounty Conference | Pearson


Red Team and Bug Bounty Conference | Pearson
English | Size: 489.10 MB
Genre: eLearning

3 Hours of Video Instruction

Learn adversarial reconnaissance, attack surface mapping, and open-source intelligence (OSINT) in a workshop environment

Overview

Exclusive Insights from Cybersecurity Industry Experts and Founders: This conference video offers a unique opportunity to hear directly from the minds behind the cutting-edge tools and techniques used in the field. Attendees will learn from the founder of the OWASP Amass Project and a seasoned professional in adversarial reconnaissance, among other experts.
Demonstrations and Hands-On Experience: See practical, hands-on demos focusing on adversarial reconnaissance, attack surface mapping, and open-source intelligence. Each section includes active demos.
Interactive Q&A: View Q&A sessions that occurred after each live presentation, enabling you to gain a deeper understanding of the topics.
Welcome to the Red Team Bug Bounty Conference, a video of the exclusive virtual conference focusing on the cutting-edge tools, tactics, and techniques used in cybersecurity and ethical hacking. This three-hour summit offers a wealth of insights from industry experts and hands-on experiences to elevate your skill set using a Red Team approach, where the speakers instruct through emulating malicious attackers to identify vulnerabilities, weaknesses, and potential entry points that real attackers could exploit. Each section starts with an industry expert exploring a specific Bug Bounty tool or method, followed by live demos taught in a workshop fashion where you can watch or follow along. Each segment then ends with a Q&A where the demo will be broken down and you can ask questions.

Industry expert, author, and trainer Omar Santos will guide the conversation and share insights. Sections include:

Adversarial Reconnaissance, with seasoned professional Jason Haddix, offers a deep dive into the tools and strategies used by adversaries, red teamers, and bug bounty hunters during the reconnaissance phase. You’ll get a live walkthrough of various tools, making this a must-attend for anyone in the offensive security, ethical hacking, and bug bounty (bug hunting) space.
Exploring the Future of Attack Surface Mapping and the OWASP Amass Project with Jeff Foley, the founder of the Amass Project, will enlighten us with an overview of the project’s future direction and its immense potential in advancing ethical hacking and cybersecurity.
OSINT for Hackers: Unveiling the Power of Open-Source Intelligence with Sandra Stibbards then provides an exciting journey through the world of OSINT, with hands-on demonstrations and discussions about leveraging public data sources for offensive security.

DOWNLOAD FROM RAPIDGATOR

rapidgator.net/file/84f300fa1933b084723a74a9af547f8c/PN-RedTeamandBugBountyConference.part1.rar.html
rapidgator.net/file/e2bcaf0db6f6b16cbe7ce8a645b321e4/PN-RedTeamandBugBountyConference.part2.rar.html

DOWNLOAD FROM TURBOBIT

trbbt.net/0zagvlkjs98s/PN-RedTeamandBugBountyConference.part1.rar.html
trbbt.net/w42rloet3eel/PN-RedTeamandBugBountyConference.part2.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.