Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Health & Fitness
Sports
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/a5/c9/1e/a5c91eb5-4a44-012e-7d7b-f1e13020c001/mza_5578538375560766742.jpg/600x600bb.jpg
Security Confidential
Dark Rhiino Security
222 episodes
3 days ago
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
Show more...
Tech News
News
RSS
All content for Security Confidential is the property of Dark Rhiino Security and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
Show more...
Tech News
News
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/4728945/4728945-1740155291832-7d4051aa23d0a.jpg
S17 E09 (VIDEO) The Hacker's Playbook
Security Confidential
40 minutes 38 seconds
2 months ago
S17 E09 (VIDEO) The Hacker's Playbook

Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring

00:00 Intro

02:14 All hackers aren’t bad?

04:38 How is cybersecurity in the Middle East

06:03 To become an Ethical hacker, should you focus on penetration testing first?

07:14 How does a hackers mind work?

12:04 How do you not get discovered in the scanning phase?

14:16 Hackers prefer to work alone

15:10 Hackers aren’t using the same tools

19:05 If you want in, you could get in

28:57 Any companies that are well defended?

30:45 Air gapping correctly

39:10 More about Husam------------------------------------------------------------To learn more about Husam visit https://www.linkedin.com/in/husamshbib/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com

Security Confidential
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.