Play by Play: Ethical Hacking - Deconstructing the Hack

In this Play by Play, we talk through a number of real world hacking incidents that align to courses within the Ethical Hacking series. We don't just talk, we take these incidents and explore the mechanics of how the underlying risks are exploited.
Course info
Rating
(48)
Level
Beginner
Updated
September 26, 2016
Duration
1h 29m
Table of contents
Description
Course info
Rating
(48)
Level
Beginner
Updated
September 26, 2016
Duration
1h 29m
Description

Attacks against information systems have become the established norm for online assets these days. Hacktivists, career criminals, and nation states are all actively compromising our systems with unprecedented regularity, but for many technology professionals, the risks to them remain hypothetical; they hear about these incidents on the news but don't get exposure to how the attacks are actually executed. In this Play by Play, we talk through a number of real world hacking incidents that align to courses within the Ethical Hacking series. But we don't just talk, we take these incidents and explore the mechanics of how the underlying risks are actually exploited. It's a real world, very practical look at the state of online security as we deconstruct the hacks.

About the author
About the author

Gary Eimerman is VP of IT Pro Content at Pluralsight. He brought his expertise over from TrainSignal, where he spent eight years helping to grow the company into the leader in online IT training.

More from the author
More courses by Gary Eimerman
About the author

Troy is a Software Architect, Microsoft MVP for Developer Security and ASPInsider. He's a regular conference speaker, frequent blogger at troyhunt.com and is the author of the OWASP Top 10 for .NET developers series and the free eBook of the same name.

More from the author
Play by Play: Emerging Threats in IoT
Beginner
57m 21s
12 Oct 2017
Play by Play: Azure Beyond Websites
Beginner
1h 16m
14 Apr 2017
More courses by Troy Hunt