Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Getting Started in Infosec
Search
skypatil
April 15, 2022
Technology
0
42
Getting Started in Infosec
Getting Started in Infosec
skypatil
April 15, 2022
Tweet
Share
More Decks by skypatil
See All by skypatil
How to get started into BUG BOUNTIES
skypatil
0
130
Other Decks in Technology
See All in Technology
マルチプロダクト×マルチテナントを支えるモジュラモノリスを中心としたアソビューのアーキテクチャ
disc99
1
390
風が吹けばWHOISが使えなくなる~なぜWHOIS・RDAPはサーバー証明書のメール認証に使えなくなったのか~
orangemorishita
15
5.6k
LLMで構造化出力の成功率をグンと上げる方法
keisuketakiguchi
0
630
Strands Agents & Bedrock AgentCoreを1分でおさらい
minorun365
PRO
6
270
LLMをツールからプラットフォームへ〜Ai Workforceの戦略〜 #BetAIDay
layerx
PRO
1
920
【CEDEC2025】『Shadowverse: Worlds Beyond』二度目のDCG開発でゲームをリデザインする~遊びやすさと競技性の両立~
cygames
PRO
1
320
LTに影響を受けてテンプレリポジトリを作った話
hol1kgmg
0
340
Backlog AI アシスタントが切り開く未来
vvatanabe
0
110
Serverless Meetup #21
yoshidashingo
1
110
相互運用可能な学修歴クレデンシャルに向けた標準技術と国際動向
fujie
0
230
Vision Language Modelと自動運転AIの最前線_20250730
yuyamaguchi
3
1.2k
Amazon Q Developerを活用したアーキテクチャのリファクタリング
k1nakayama
2
200
Featured
See All Featured
The Power of CSS Pseudo Elements
geoffreycrofte
77
5.9k
Art, The Web, and Tiny UX
lynnandtonic
301
21k
"I'm Feeling Lucky" - Building Great Search Experiences for Today's Users (#IAC19)
danielanewman
229
22k
Site-Speed That Sticks
csswizardry
10
760
Designing for humans not robots
tammielis
253
25k
Responsive Adventures: Dirty Tricks From The Dark Corners of Front-End
smashingmag
251
21k
Building Flexible Design Systems
yeseniaperezcruz
328
39k
Rails Girls Zürich Keynote
gr2m
95
14k
A better future with KSS
kneath
239
17k
How to train your dragon (web standard)
notwaldorf
96
6.2k
Designing for Performance
lara
610
69k
Visualization
eitanlees
146
16k
Transcript
Akash Patil GETTING STARTED IN INFOSEC Starting our journey
Who am i? Hackerone, Bugcrowd & YesWeHack and VDPS Ethical
Hacker / Bug Bounty Hunter Qseap Infotech Pvt Ltd Information Security Consultant Professional Keyboard Player Graphic Designer
Item 1 Item 2 Item 3 Item 4 Item 5
50 40 30 20 10 0 What is Information Security Becoming a bigger role in daily life. Protecting information assets from unauthorized access, modification, disruption, or any other Unwanted behaviour
Categories of Information Security Network Security Application Security Web Thick-Client
Mobile Security Infrastructure Security Physical Security Cloud Security Automative Security
None
HOW DO I GET INVOLVED? Lets Start
The Hacker Playbook 1 Web Application 101 2 The Web
Application Hackers Handbook 3 Burp Suite Essentials 4 Books
The Hacker News 1 Youtube 2 Google 3 Facebook 4
News
Medium 1 PentesterLand 2 Bug Reader 3 Security Blogs 4
Blogs/Podcasts
1 2 3 4 Create Account Follow peoples in the
industry Participate in the discussion Twitter
Information Security Community The people involved in Information Security Work
for many different companies Collaborate Network Share Information Educate
Certifications CompTIA A+ Network+ Security+ Offensive Security CISSP /eLearn /
TCM OSCP/OSWE eJPT eWAPT PNPT
Overview of Penetration Testing Timeline Given time to test the
application Grey Box / Black Box / White Box Provided by the Client Report Genration Report Writing
Tools Basic Tools Burpsuite Linux Open Source
@skypatil98 twitter
[email protected]
Email Address linkedin.com/in/akashpatil98/ Linkedin Thank you! Feel
free to approach us if you have any questions. https://akashpatil.me Website