Artwork

Emerging Tech Mastery (ETM)에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Emerging Tech Mastery (ETM) 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Player FM -팟 캐스트 앱
Player FM 앱으로 오프라인으로 전환하세요!

ETM Show #23: How to Protect Yourself from Hackers and Cyber Attacks

1:01:45
 
공유
 

Manage episode 380172353 series 3472927
Emerging Tech Mastery (ETM)에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Emerging Tech Mastery (ETM) 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

Ever wondered how hackers work?

On this episode we brought back Information Security (InfoSec) professional and Certified Ethical Hacker, Frank Trezza, to tell us.

He helps illuminate where various data vulnerabilities are and how to shield yourself from them.

Information Security is the practice of protecting information from unauthorized access, theft and other inappropriate uses without the consent of the data owners.

Rather than becoming a victim, take precautions to protect yourself with some simple steps anyone can do.

After listening to this episode you will learn:

  • What is Red, Blue and Purple Teaming
  • Who are some Authorities and Certifying Bodies in InfoSec and Cybersecurity
  • How digital isn't the only way to break into places hacking-wise
  • About the code of the street in lock picking communities
  • A story of one hacker who broke into the wrong bank and what happened
  • How there are specific rules of engagement with Pen Testing
  • A variety of vulnerabilities and what the attack vector was
  • How to protect yourself from hackers with these simple techniques

For show notes and lots of additional free resources, please visit: https://www.emergingtechmastery.com/hackers/

  continue reading

35 에피소드

Artwork
icon공유
 
Manage episode 380172353 series 3472927
Emerging Tech Mastery (ETM)에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Emerging Tech Mastery (ETM) 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

Ever wondered how hackers work?

On this episode we brought back Information Security (InfoSec) professional and Certified Ethical Hacker, Frank Trezza, to tell us.

He helps illuminate where various data vulnerabilities are and how to shield yourself from them.

Information Security is the practice of protecting information from unauthorized access, theft and other inappropriate uses without the consent of the data owners.

Rather than becoming a victim, take precautions to protect yourself with some simple steps anyone can do.

After listening to this episode you will learn:

  • What is Red, Blue and Purple Teaming
  • Who are some Authorities and Certifying Bodies in InfoSec and Cybersecurity
  • How digital isn't the only way to break into places hacking-wise
  • About the code of the street in lock picking communities
  • A story of one hacker who broke into the wrong bank and what happened
  • How there are specific rules of engagement with Pen Testing
  • A variety of vulnerabilities and what the attack vector was
  • How to protect yourself from hackers with these simple techniques

For show notes and lots of additional free resources, please visit: https://www.emergingtechmastery.com/hackers/

  continue reading

35 에피소드

모든 에피소드

×
 
Loading …

플레이어 FM에 오신것을 환영합니다!

플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.

 

빠른 참조 가이드

탐색하는 동안 이 프로그램을 들어보세요.
재생