{"id":1826,"date":"2016-12-06T23:07:33","date_gmt":"2016-12-07T06:07:33","guid":{"rendered":"https:\/\/zed.inguardians.com\/?p=1826"},"modified":"2019-08-02T12:55:57","modified_gmt":"2019-08-02T19:55:57","slug":"pen-test-perfect-storm-trilogy-part-1","status":"publish","type":"post","link":"https:\/\/zed.inguardians.com\/presentations\/pen-test-perfect-storm-trilogy-part-1\/","title":{"rendered":"Pen Test Perfect Storm Trilogy \u2013 Part 1"},"content":{"rendered":"

The Pen Testing Perfect Storm webcast series brings you a deluge of security assessment tactics and strategies from the combined forces of three penetration testing experts:<\/p>\n

Kevin Johnson<\/strong>: web guru and senior security analyst
\nJosh Wright<\/strong>: wireless wizard and senior security researcher
\nEd Skoudis<\/strong>: network security penetration tester<\/p>\n

This trio of experts will show you how to assess an organization\u2019s real business risks by taking a holistic, comprehensive look at your information security \u2013 just as determined and skilled attackers do in the wild. You\u2019ll learn techniques for safely replicating chains of threats that can pivot throughout your infrastructure, including:<\/p>\n

Web<\/strong>\u00a0\u2014 SQL injection, cross-site scripting, remote file inclusion, etc.<\/p>\n

Wireless<\/strong>\u00a0\u2014 wireless LAN discovery, crypto and protocol attacks, client duping, etc.<\/p>\n

Network<\/strong>\u00a0\u2014 port scanning, service compromise, client-side exploitation, etc.<\/p>\n

This webcast series is ideal for anyone seeking to go beyond point-focused, \u201ctunnel-vision\u201d assessments to real-world penetration testing \u2013 mimicking the sophisticated, multi-staged threats that pose the most significant information security risks to organizations today.<\/p>\n

Download Slides<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

The Pen Testing Perfect Storm webcast series brings you a deluge of security assessment tactics and strategies from the combined forces of three penetration testing experts: Kevin Johnson: web guru and senior security analyst Josh Wright: wireless wizard and senior security researcher Ed Skoudis: network security penetration tester This trio of experts will show you […]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[51],"tags":[160,17,18,108,161,155,36,163,162],"_links":{"self":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts\/1826"}],"collection":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/comments?post=1826"}],"version-history":[{"count":2,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts\/1826\/revisions"}],"predecessor-version":[{"id":1830,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts\/1826\/revisions\/1830"}],"wp:attachment":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/media?parent=1826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/categories?post=1826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/tags?post=1826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}