Play by Play: Ethical Hacking with Troy Hunt
By Gary Eimerman and Troy Hunt
Course info
Course info
Description
In this Play by Play, Troy Hunt will show how easy it is for a victim to fall prey to an attack. When all is said and done, you should understand how important it is to be prepared for these attacks and know the right steps to mitigate them in the first place.
Section Introduction Transcripts
Course Overview
Welcome, and I'm Gary Eimerman, and this is Play by Play at Pluralsight. This is a series where we give you a rare view into the workflows and thought process of top admins, developers, and designers. Have you ever wished you could watch one of your tech heroes work on a project on their own time, using their own tools, at their natural speed? Not a rehearsed presentation or a prepared course, but planning and problem solving as it happens in the real world every day. That's what we do in this series. We give talented admins, developers, and designers a task to work on, live and unrehearsed, for about 2 hours. We talk through architecture decisions and fix unexpected problems. This isn't a tutorial. We won't pause to explain how to set up server infrastructure or development environment, but you will see how professionals use tools in their everyday environments. In this session, I have the great pleasure to sit down with security expert and Microsoft MVP Troy Hunt. We discuss some ethical hacking techniques with Troy as he shares with us some very easy exploits and how to address them in our environments. We hope you can learn from some of these techniques to help secure your own environments.