Hi [[ session.user.profile.firstName ]]

Windows & Linux System Administration for Penetration Testing

This webinar will go over various systems administration concepts in both Windows and Linux operating systems. To be successful in penetration testing you must understand the full potential of both Windows and Linux from an administrative perspective and how you leverage built-in operating system commands, utilities, and features for exploitation. This webinar is for those who are interested in penetration testing/ethical hacking. This webinar will provide you with a foundation to become successful in penetration testing. You will also be provided with list of external resources and areas you should focus on to further develop your penetration testing skills.

Objectives – What You Will Leave Knowing:

Common Windows and Linux services – and how they are commonly abused
Common Windows and Linux configurations – and how they are commonly abused
How Windows and Linux manage passwords – locally and within a domain
Windows and Linux privileges - including techniques for elevating privileges
Windows and Linux command line usage for penetration testing
Built in programming/development/scripting languages that can be leveraged for exploitation in Windows and Linux
Interactive & non-interactive shells
File transfer techniques in Windows and Linux
Windows and Linux firewalls
Built in tools in Windows and Linux for troubleshooting exploitation techniques
Enumerating information from Windows and Linux using built in tools
Leveraging common Windows and Linux systems administration tools for exploitation and lateral movement
External resources available to further learn about Windows and Linux systems administration
Recorded May 6 2017 100 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Hamza Sirag
Presentation preview: Windows & Linux System Administration for Penetration Testing

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Career Conversations w/ Amelie Koran, Department of Health and Human Services Nov 16 2018 12:00 am UTC 60 mins
    Jessica Gulick, MBA | PMP | CISSP
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Amélie E. Koran serves as the Deputy Chief Information Officer for the U.S. Department of Health and Human Services, Office of the Inspector General. Amélie comes to DHHS OIG via a rather circuitous route through multiple industry sectors, academia, and the public sector
    including The Walt Disney Company, Carnegie Mellon University CERT/CC, Mandiant, The World Bank and The American Chemical Society. Her public sector experience started as Lead Enterprise Security Architect for the U.S. Department of the Interior, the U.S. Treasury Department leading the Continuous Diagnostics and Mitigation implementation across the entire agency and a leadership development rotation as part of the President’s Management Council
    Fellowship serving the Federal CIO in supporting cybersecurity policy analysis and legislative review, including stewardship of the Open Data Initiative and help in giving “birth” to the United States Digital Service (USDS). She’s an ardent advocate for new approaches to hiring talent into and rational applications of security strategy and technologies for the Federal government space.

    Twitter: @webjedi
  • Foolproof Digital Identity with Behavioral Biometrics Recorded: Nov 15 2018 59 mins
    Ehab Samy, VP Product Management, Plurilock
    Digital identity authentication can be challenging to do effectively. Join us to learn about the evolution of biometrics technologies, from those that determine who you ARE in the digital realm, to behavioral biometrics that determine your identity based upon what you DO and how you do it. Ehab Samy, Vice President of Product Management for Plurilock, will map which digital identity management mechanisms are best suited for particular environments including law enforcement, airport security, health care, and the workplace.
  • Gaining the Upper Hand on Network Vulnerabilities Recorded: Nov 8 2018 60 mins
    Nathan Vega, VP Product, Columbus Collaboratory
    Join security experts from Columbus Collaboratory to learn how to elevate your network’s cybersecurity defenses by identifying and remediating the most critical vulnerabilities. We will discuss best practices for vulnerability scanning, managing the seemingly overwhelming volume of scan data, data visualization techniques, and how combining vulnerability data, threat data and asset classification is critical to prioritizing your remediation efforts when resources are scarce and time is of the essence.
  • Career Conversations w/ Kristen Judge, Cybercrime Support Network Recorded: Oct 18 2018 46 mins
    Jessica Gulick, MBA | PMP | CISSP
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Kristin Judge, Author at LinkedIn Learning

    Kristin was elected to serve as a Washtenaw County Commissioner in 2008 and supported the U.S. Department of Homeland Security in growing cybersecurity outreach to state and local government officials. After elected office, she worked at the Center for Internet Security, focusing on connecting state and local governments to federal services and technology needed to improve cyber security.

    As Director of Government Affairs at the National Cyber Security Alliance (NCSA), Kristin worked with Google, FTC, FBI, SBA, DHS, NIST, congressional leaders and other key stakeholders across the country to educate consumers and businesses how to protect sensitive data.

    As a thought leader, Kristin has been seen on the C-SPAN Network, local news outlets and called on by technology publications like SC Magazine and Government Technology to share best practices for online safety; being named an SC Media “Women in IT Security Influencer” in 2017.

    In 2017, Kristin was chosen for the 3rd cohort in the Presidential Leadership Scholars program which is a partnership between the presidential centers of George W. Bush, William J. Clinton, George H.W. Bush, and Lyndon B. Johnson to bring together a select group of leaders who share a desire to create positive change across our Nation.

    To address the needs of cybercrime victims, Kristin recently founded the nonprofit Cybercrime Support Network to connect victims with federal, state and local resources in a coordinated manner.
  • When Biometrics Simply Don't Cut It Recorded: Oct 10 2018 61 mins
    Ehab Samy, Vice President of Product Management for Plurilock
    Identifying a user through fingerprints, facial recognition or iris scanning is simply not enough for today's digital age. Join us to learn about the shift from point-in-time identification to behavioral biometrics and how it is impacting today's workforce. Ehab Samy, Vice President of Product Management for Plurilock, will explore game-changing practices in continuous authentication and identity management to control access to physical spaces, applications, and government services.
  • Career Conversations w/ Sandra Larson of Looking Glass Recorded: Oct 4 2018 42 mins
    Jessica Gulick, MBA | PMP | CISSP
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest: Sandra Larson, M.S. Applied Intelligence

    Hosted by Jessica Gulick, MBA | PMP | CISSP

    About the Speaker:

    Sandra Larson is a Senior Director of Intelligence for LookingGlass Cyber Solutions, a cybersecurity company specializing in physical, cyber, and brand risks for small business, global enterprises and government agencies. Sandra has been with LookingGlass for almost ten years, and manages the client relationships for LookingGlass’ clientele in the food and agribusiness, pharmaceutical, retail, and technology industries. Previously, Sandra received her Master of Science in Applied Intelligence from Mercyhurst University.
  • What Your Security Team Needs to Know about GDPR Recorded: Sep 12 2018 41 mins
    Richard Stiennon from IT-Harvest & Interfocus Technologies
    The scope of the 435 pages of the EU’s General Data Protection Regulation (GDPR) is vast and has raised the specter of excessive, unforeseen and unintended compliance consequences for companies around the world. In order to ensure individual privacy in the digital realm, there are numerous enterprise security requirements imposed by these regulations with significant compliance concerns, notification requirements and the potential for excessive penalties for non-compliance. Join Interfocus Technologies and security expert Richard Stiennon from IT-Harvest for an overview of GDPR’s implications on your security practices from a people, process and technology point of view. We will review the requirements for and processes to secure your endpoints, monitor and report on malicious user activity, and identify and trace where personal data resides in your network.
  • A Deep Dive into the 2018 State of IoT Security Report Recorded: Sep 12 2018 33 mins
    Vince Crisler, CEO of Dark Cubed
    Dark Cubed conducted extensive testing and determined that many IoT “smart home” device manufacturers have failed to implement basic security protections in the design, development, and production of their products such as electrical plugs, light bulbs and security cameras.

    Join CEO Vince Crisler for a live webcast as he discusses:

    · The creation and operation of the closed testing environment to simulate smart devices in a real-world home

    · The integration of Dark Cubed’s platform to capture and examine traffic patterns and message contents between each device, its back-end infrastructure and its Android app

    · Detailed port communications profiles, Nmap scan findings, infrastructure port reviews, man-in-the-middle assessments, Android app permissions and profiles, and privacy policy reviews for these light bulbs, cameras, and electrical outlets

    Learn more here: www.thestateofiotsecurity.com
  • Career Conversations w/ Cyberjutsu Girls Academy Leadership Team Recorded: Aug 23 2018 48 mins
    Jessica Gulick, MBA | PMP | CISSP
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest:
    Katie Nickels - MITRE
    Kandis Weiler - MBA Candidate, Marymount University
  • Artificial Intelligence & Employee Security: Greasing the Wheels of Productivity Recorded: Aug 15 2018 32 mins
    Ehab Samy, VP Product Management, Plurilock
    Traditional security and authentication methods are designed to put up stumbling blocks for your employees, challenging them at several points throughout their workday to identify themselves. To do this they must enter, remember, and frequently change passwords, and in the expanding world of two- or multi-factor authentication the enterprise seeks greater security at the further expense of productivity. But traditional passwords and other authentication methods can be compromised, so the impact to your user processes does not always deliver proportional security.

    Artificial intelligence and biometrics can change the authentication game, supporting enhanced security by automatically identifying employee identity without impacting workflows and user processes. Join Ehab Samy, VP Product Management, to learn about applications of biometrics and Artificial Intelligence that smooth your employees’ path to completing any task at work.
  • Mark Whitehead on Cyber Threats and Improving Security Recorded: Aug 8 2018 26 mins
    Mark Whitehead (Trustwave) & Mari Galloway (Women's Society of Cyberjutsu)
    Join Mark Whitehead, Director, Spider Labs Americas at Trustwave for an exclusive interview at Black Hat 2018 in Las Vegas on the latest cyber threats and trends in cybersecurity. Some of the topics up for discussion will include:
    - What are the 3-5 top cyber threats CISOs are worried about in 2018? What's new on the threatscape?
    - How to improve cybersecurity? Key areas to focus on. Top recommendations for CISOs.
    - Data breaches affecting millions of users are on the rise. What are the security controls / policy changes / tech solutions businesses should implement to prevent breaches and detect them faster?
    - What are the biggest threats to security coming from the IoT? Are you worried about cyberwarfare? How should we be protecting our critical infrastructure?
    - Cybercrime is on the rise. How can businesses defend against ransomware, phishing, social engineering, and other cyber-attacks? Is investing in technology enough, or should the focus also be on cyber awareness education for employees.
    - There is chronic shortage of skilled cyber security workforce in the US and worldwide. How are businesses coping with the lack of cyber talent in the age of cyber-attacks? Is AI/ML helping alleviate the problem? How does diversity (or lack thereof) play into all of this?
    - What career path will be most advantageous to people starting their cybersecurity career?
    - Can you explain testing maturity models as it relates to test organizations conduct to test their security posture?
    - How do you properly scope testing?
    - How do you test in cloud and hybrid environments?
    - Can you explain the compliance vs security mindset?
  • Career Conversations w/ Twitter Queens Tracy and Amanda Recorded: Jul 19 2018 59 mins
    Jessica Gulick, MBA | PMP | CISSP
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest:
    Amanda Berlin, MCITP
    Tracy Maleeff, Masters in Library and Information Science
  • Career Conversations with the WSC Board of Directors Recorded: Jun 28 2018 61 mins
    WSC Board of Directors
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guests:
    Lisa Jiggetts, MBA | CISSP | ECSA | C|EH | SCNP | MCSE | CCNA | SCSA | Network+ | A+

    Jessica Gulick, MBA | PMP | CISSP

    Mari Galloway, MSIS | CISSP | GSEC | GMON | GCIH | GPEN | GCFE | C|EH | CCNA Security | CCNA | Security+ | IT Project+ | MOS

    Elena Steinke, MBA | CISSP | Security+ | C|EH | Threat Intelligence Analyst

    Hosted by Mansi Thakar, Associate of the Women's Society of Cyberjutsu
  • Increasing Cyber Workforce Diversity Recorded: Jun 20 2018 64 mins
    Max Shuftan, Jessica Gulick and other panelist
    Join this webinar to hear from past students and current champions discuss how the SANS CyberTalent program is changing lives and closing the workforce gap. The cybersecurity workforce gap can be partly solved through increasing diversity. Organizations like SANS CyberTalent and the WSC are reaching into communities throughout Maryland and the US searching for professionals with technical appitude but new to cybersecurity.

    These academies are designed to help qualified veterans and women receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in six to eight months, depending upon program selected. The program is at NO COST to the students selected.


    Come listen to learn:
    • What the selection process includes and important application tips
    • Understand what kind of training is provided (length and format)
    • Hear from a recent graduate who will share her experience
    • How this training academy and related certifications can help your career
  • Career Conversations w/ Kristin Demoranville; Manager of Global Policy Recorded: May 17 2018 61 mins
    Jessica Guilick
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Kristin Demoranville is a triple threat in STEM, she holds a BS in Environmental Management, has worked in Information Technology since dial up modems were a thing, and is currently focusing on Manufacturing Security & Global Policy at Sony.
  • Gamification and Security: The Role of Competitions in Readiness and Defense Recorded: Apr 26 2018 57 mins
    Lisa Jiggetts, Founder, President & CEO of the Women's Society of Cyberjutsu
    Security operations face intensifying pressures along numerous fronts, including a constantly shifting threat landscape, an increasingly complex environment to defend, and an extreme shortage of skills. This panel of distinguished security experts will discuss the role that competitions – at the primary school, collegiate and professional levels – can play in attracting workers to the security arena, growing their skills, and developing methods to identify and defend against the greatest threats and risks of the day.

    Lisa Jiggetts, the Founder & CEO of the Women's Society of Cyberjutsu, one of the fastest growing nonprofits dedicated to women in cybersecurity, will spearhead this panel of experts is cyber security and competitions.

    Other panelists include Mika Devonshire, Director of Forensics and Cyber Risk Analytics at SSIC; Marcelle Lee, Threat Researcher at LookingGlass Cyber Solutions; and Dan Manson, Professor of Computer Information Systems at Cal Poly Pomona.
  • Career Conversations: Julia Hermann, Global Information Security Analyst Recorded: Apr 19 2018 61 mins
    Julia Hermann, Information Security Analyst at Giesecke & Devrient GmbH
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guests: Julia Hermann, Information Security Analyst at Giesecke & Devrient GmbH

    Hosted by Elena Steinke, Board Member of the Women's Society of Cyberjutsu

    About the Speaker:
    Julia Hermann brings more than 15 years of experience in systems engineering, IT security and information security management. She started off her career at a large German Telco provider in the field of IT security consulting, developing and implementing security solutions for large international customers. Afterwards, she spent the longest time of her career at an agency of the European Union as Information Security and Risk Officer, establishing IT security from the moment of its foundation.

    Currently, as Information Security Analyst within the corporate security department of an international company in Munich, her main tasks involve assessment of requirements and technical conception of security solutions as well as threat intelligence, security incident management and audits.

    Being a certified CISSP and CISM, she contributed to the foundation of the (ISC)2 Chapter Germany. Previously as a member and since May 2017 as lead of the ISACA Germany Chapter working group on information security, she co-authored the Implementation Guideline ISO/IEC 27001:2013 and participated to the development of the 2-day certification course “Information Security Practitioner.”
  • GDPR and you! Perfect together....? Recorded: Mar 29 2018 58 mins
    Joshua Marpet. Red Lion, COO/Founder
    GDPR is a huge topic, with issues ranging from "What does it mean to my business processes?" to "Do I have to care about it?" And that's besides the technical bits! Together, let's explore what it means for a sample company. We'll discuss data, geography, and business processes. You'll learn about some of the pitfalls, and some of the opportunities inherent in GDPR. And maybe we can make it work for you, instead of causing a headache. Want to find out? Just show up.

    Joshua Marpet is an accomplished speaker, long time information and physical security practitioner, as well as a start up CEO and serial entrepreneur.
    He has presented on topics ranging from Facial Recognition to National Security, to audiences from government agencies, law enforcement, Fortune 5 companies, and many others. His research encompasses Digital Forensics, business security maturity, and how not to start an information security business!

    Joshua has been in the hot seat, at all levels of IT and Infosec. From the Federal Reserve, to law enforcement, to being an entrepreneur, Josh has been there. Let's talk.
  • Career Conversations w/ Debra J Farber - Privacy Guru Recorded: Mar 22 2018 59 mins
    Debra J. Farber, Privacy Guru and Jessica Gulick, WSC Vice President
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest: Debra J Farber, CISSP-ISSMP, CIPP/US, CIPP/E, CIPT, CIPM, FIP | Executive Consultant & U.S. Chief Privacy Office, CRANIUM

    Hosted by: Jessica Gulick, WSC Vice President, CEO of Katzcy Consulting

    About the Speaker:
    Debra J. Farber (@privacyguru) is a data privacy and information security executive and entrepreneur with 13+ years of data strategy, operations, public policy, training, product, and compliance experience across industries and frameworks. She's Executive Consultant & U.S. Chief Privacy Officer, at CRANIUM, an EU-based privacy and security consulting firm with offices in Brussels, Utrecht, Budapest, NYC, & San Francisco. She also serves as an Executive Consultant and External DPO for CRANIUM's many clients.

    Based in San Francisco, Debra serves on several industry working groups and startup advisory boards. She is a member of the IEEE Data Privacy Process Standards Working Group, IAPP CIPT Exam Development Advisory Board, and privacy tech vendor BigID's Advisory Board. In addition, Debra serves as Editorial Board Member for Cyber Security: A Peer-Reviewed Journal. She also co-founded the SF-based non-profit project, Women in Security and Privacy (WISP).
  • The Future of Passwords Recorded: Mar 22 2018 58 mins
    Hamza Sirag
    This webinar will provide an overview of the future of passwords. Passwords have become very important, protecting a treasure trove of information. You will get an inside look at the techniques and tactics used conduct password attacks. We will discuss the various countermeasures available, new improvements made to the latest operating systems to prevent successful password attacks, and how the industry is trying to eliminate passwords. We will conclude by discussing ways we can potentially circumvent new countermeasures.

    Hamza Sirag Hamza is currently an Information Security consultant. He has spent the majority of his time immersed in the world of cybersecurity. He has had the opportunity to lead complex penetration tests for a variety of federal and commercial clients. He is the founder of Beltway Hackers, a Northern VA based meetup group focused on offensive cybersecurity. https://www.meetup.com/Beltway-Hackers
WSC is helping women in cybersecurity reach their career goals
The Women’s Society of Cyberjutsu (WSC) is a non-profit, 501c(3) organization passionate about helping and empowering women to succeed in the cybersecurity field.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Windows & Linux System Administration for Penetration Testing
  • Live at: May 6 2017 4:00 pm
  • Presented by: Hamza Sirag
  • From:
Your email has been sent.
or close