Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Fiction
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/99/8e/f4/998ef47b-4e95-d7f8-5b6c-567a6b8bef7b/mza_537803305394389172.png/600x600bb.jpg
Legitimate Cybersecurity Podcasts
LegitimateCybersecurity
25 episodes
2 days ago
Legitimate Cybersecurity Podcasts
Show more...
Technology
RSS
All content for Legitimate Cybersecurity Podcasts is the property of LegitimateCybersecurity and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Legitimate Cybersecurity Podcasts
Show more...
Technology
https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog20937193/57c38d710f5c2c6f2a4419e79b083d60.jpg
The Truth About Ethical Hacking (Pen Testing Myths Busted!)
Legitimate Cybersecurity Podcasts
41 minutes 33 seconds
4 months ago
The Truth About Ethical Hacking (Pen Testing Myths Busted!)
Are you curious about penetration testing, aka legal hacking? In this episode of Legitimate Cybersecurity, Frank and Dustin tear down the myths of hacking, break down real-world pen testing, and share hilarious (and horrifying) war stories from the field.We cover:✅ The skills you actually need to get into pen testing✅ What certs like OSCP, CEH, and GPEN really mean✅ Why most companies have no idea what’s on their network✅ Real pen test experiences gone sideways✅ Why you might still get arrested after a bug bounty✅ And how to break into the field—even without a degree🎙️ WE NEED YOUR HELP! 🎙️We’re in the running for Best Technology Podcast at PodcastAwards.com — and we’d love your vote!🗳️ Go to https://www.podcastawards.com, register, and vote for Legitimate Cybersecurity in the Technology category.Your vote helps real, nerdy cybersecurity voices rise to the top!📌 Like, Subscribe & Share.🔔 Click the bell to get notified about new episodes (and Frank’s midlife crises).📎 Check the show notes for career resources, links, and our Hack the Box profile recs!#PenTesting #EthicalHacking #CybersecurityCareers #OSCP #CEH #GPEN #HackTheBox #RedTeam #CyberSecurityPodcast #InfoSec #HackerLife #BugBounty #CybersecurityTraining #CyberMythsBusted #ITSecurity #SecurityTesting #KaliLinux #CyberCareer #podcastawards Chapter Breaks00:00 - Intro: What Is Penetration Testing?01:31 - Myths vs. Reality of Hacking02:40 - What Kind of People Make Good Pen Testers?05:33 - You Don’t Need a Degree To Be a Hacker07:19 - Why AI-Generated Code Is Easy to Hack09:16 - Cybersecurity Certifications (OSCP, CEH, GPEN)12:16 - Is CEH Still Worth It?14:42 - What EC in EC-Council *Actually* Stands For16:20 - Pen Test Expectations vs. Reality19:35 - Types of Pen Tests: Internal, External, Web App, Social Engineering22:12 - Cost, Scope & Asset Prioritization24:00 - What If You Don’t Know Your Own Assets?26:58 - Pen Test Reports: Why No One Reads Them28:55 - Remediation Is Scarier Than the Hack30:49 - Hacker Teams: Foothold → Escalation → Ransom32:31 - The Most Hilarious Old Systems We’ve Found34:28 - You Must *Love* Computers To Hack Well37:03 - Want to Be a Hacker? Here’s Your Roadmap39:51 - Military & DOD Paths To Cyber Careers40:44 - Vote for Us, Subscribe, and Frank’s Midlife Crisis
Legitimate Cybersecurity Podcasts
Legitimate Cybersecurity Podcasts