Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Getting Started in Infosec
Search
skypatil
April 15, 2022
Technology
69
0
Share
Getting Started in Infosec
Getting Started in Infosec
skypatil
April 15, 2022
More Decks by skypatil
See All by skypatil
How to get started into BUG BOUNTIES
skypatil
0
170
Other Decks in Technology
See All in Technology
新卒エンジニア研修、ハンズオンの設計における課題と実践知/ #tachikawaany
nishiuma
2
140
多角的な視点から見たAGI
terisuke
0
130
freeeで運用しているAIQAについて
qatonchan
0
530
SLI/SLO、「完全に理解した」から「チョットデキル」へ
maruloop
3
380
Shiny New Tools Won't Fix Your Problem
trishagee
1
120
オライリーイベント登壇資料「鉄リサイクル・産廃業界におけるAI技術実応用のカタチ」
takarasawa_
0
380
QAエンジニアはどうやって プロダクト議論の場に入れるのか?
moritamasami
2
410
拝啓、あの夏の僕へ〜あなたも知っているApp Runnerの世界〜
news_it_enj
0
230
AI時代に、 データアナリストがデータエンジニアに異動して
jackojacko_
0
710
Forget technical debt
ufried
0
180
知ってた?JavaScriptの"正しさ"を検証するテストが5万以上もあること(Test262)
riyaamemiya
1
180
小さいVue.jsを30分で作る
hal_spidernight
0
150
Featured
See All Featured
Done Done
chrislema
186
16k
The SEO Collaboration Effect
kristinabergwall1
1
440
Design in an AI World
tapps
1
210
YesSQL, Process and Tooling at Scale
rocio
174
15k
Why Our Code Smells
bkeepers
PRO
340
58k
Practical Orchestrator
shlominoach
191
11k
Why Mistakes Are the Best Teachers: Turning Failure into a Pathway for Growth
auna
0
130
Making Projects Easy
brettharned
120
6.6k
The Organizational Zoo: Understanding Human Behavior Agility Through Metaphoric Constructive Conversations (based on the works of Arthur Shelley, Ph.D)
kimpetersen
PRO
0
320
A brief & incomplete history of UX Design for the World Wide Web: 1989–2019
jct
1
370
Easily Structure & Communicate Ideas using Wireframe
afnizarnur
194
17k
The AI Search Optimization Roadmap by Aleyda Solis
aleyda
1
5.8k
Transcript
Akash Patil GETTING STARTED IN INFOSEC Starting our journey
Who am i? Hackerone, Bugcrowd & YesWeHack and VDPS Ethical
Hacker / Bug Bounty Hunter Qseap Infotech Pvt Ltd Information Security Consultant Professional Keyboard Player Graphic Designer
Item 1 Item 2 Item 3 Item 4 Item 5
50 40 30 20 10 0 What is Information Security Becoming a bigger role in daily life. Protecting information assets from unauthorized access, modification, disruption, or any other Unwanted behaviour
Categories of Information Security Network Security Application Security Web Thick-Client
Mobile Security Infrastructure Security Physical Security Cloud Security Automative Security
None
HOW DO I GET INVOLVED? Lets Start
The Hacker Playbook 1 Web Application 101 2 The Web
Application Hackers Handbook 3 Burp Suite Essentials 4 Books
The Hacker News 1 Youtube 2 Google 3 Facebook 4
News
Medium 1 PentesterLand 2 Bug Reader 3 Security Blogs 4
Blogs/Podcasts
1 2 3 4 Create Account Follow peoples in the
industry Participate in the discussion Twitter
Information Security Community The people involved in Information Security Work
for many different companies Collaborate Network Share Information Educate
Certifications CompTIA A+ Network+ Security+ Offensive Security CISSP /eLearn /
TCM OSCP/OSWE eJPT eWAPT PNPT
Overview of Penetration Testing Timeline Given time to test the
application Grey Box / Black Box / White Box Provided by the Client Report Genration Report Writing
Tools Basic Tools Burpsuite Linux Open Source
@skypatil98 twitter
[email protected]
Email Address linkedin.com/in/akashpatil98/ Linkedin Thank you! Feel
free to approach us if you have any questions. https://akashpatil.me Website