Webinar

Web application security review – supply chain risk

Supply chain attacks are becoming more prevalent in the software world, and third-party code can often introduce weaknesses that critically undermine the security efforts of the developers building an application. This talk will discuss the security principals of using third-party code in the front and back-end of web applications, including some hands-on demonstrations of some real-world attacks and advice on how to identify these in your web applications, and how to remediate the risk.

The Art of Hacking: Introduction to your Infrastructure

Join Pratik from NotSoSecure, part of Claranet Cyber Security, on their Infrastructure Hacking webinar. With diverse modern infrastructure making waves, our organizational footprint is all across the space, from private internal networks to public websites and cloud services. All this gives attackers ample opportunity to gain a foothold. This webinar will cover some of the techniques we have used in our pen test engagements, from the neat to the new, to the ridiculous, to compromise such environments

What kind of security test is right for you? A buyers guide to the key differences and terminology

Presenter: Jack Stepek, Penetration Tester and IASME Cyber Essentials Lead Assessor.

Join Jack from Sec 1, part of Claranet Cyber Security, for a webinar discussing the key differences between the most popular security services, including coverage, terminology and expected outcomes.
This high-level view will help you understand and choose the services which best suit your organisation.

The session will cover:
• Vulnerability Assessments
• Penetration Testing
• Red Teaming
• Continuous Security Testing

Hacking 101: An Introduction

Presenter: Pratik Shah, Black Hat Trainer and accredited Pen Tester.

Join Pratik from NotSoSecure, part of Claranet Cyber Security, on their Hacking 101 Introduction to Information Security.

We will touch on basic concepts of information security and understand Infrastructure security, web security concepts:
- Foundation level.
- Covers basic concepts of vulnerabilities and exploits.
- Provides background information on risk and vulnerabilities.

The webinar is ideal for system administrators, web developers, IT managers, and security enthusiasts.

The Anatomy of a Cloud Hack

Presenter: Scott Issac, Black Hat Trainer, and accredited Pen Tester.

In the session, Scott will explore recently publicized Cloud Security Breaches, accompanied by real-world examples of how available reconnaissance techniques and tools are leveraged by today’s unethical hackers to successfully uncover vulnerabilities, many of which can often be undetected by scanners.

You will learn and hear about:

The Art of Hacking: Introduction to Web Applications

Presenter: Pratik Shah, Black Hat Trainer and accredited Pen Tester.

Join Pratik from NotSoSecure, part of Claranet Cyber Security, on their introduction into Web Hacking Webinar. We will touch on current hacking techniques used to compromise web applications, APIs and associated end-points and discuss:

- Advanced vulnerability identification and exploitation techniques.
- New and current hacks which affected real-life products and have found a mention in real bug-bounty programs.

Staying ahead of the web app vulnerability curve

Join Abhijay Singh, Trainer, and accredited Pen Tester, from NotSoSecure, discuss as web application vulnerabilities are on the rise, why it’s essential that developers are educated in response to the growing risk. In this webinar, we look at the increasing need for application security and how developers can be trained to tackle these threats proactively. Abhijay will provide:

- Insights into the latest security vulnerabilities
- Guidance on best security practices
- Discuss some real-world breaches and application vulnerabilities from popular websites

Web Hacking - Black Belt Style

Join Dhruv Shah, Black Hat Trainer, and accredited Pen Tester, from NotSoSecure, for the Advanced Web Hacking Webinar: Through an Attacker's Eyes: Your Web Applications.

During the webinar we will touch on current hacking techniques used to compromise web applications, APIs and associated end-points and discuss:

Páginas

Suscribirse a RSS - Webinar