Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Getting Started in Infosec
Search
skypatil
April 15, 2022
Technology
0
59
Getting Started in Infosec
Getting Started in Infosec
skypatil
April 15, 2022
Tweet
Share
More Decks by skypatil
See All by skypatil
How to get started into BUG BOUNTIES
skypatil
0
160
Other Decks in Technology
See All in Technology
日本の85%が使う公共SaaSは、どう育ったのか
taketakekaho
1
150
CDKで始めるTypeScript開発のススメ
tsukuboshi
1
390
GSIが複数キー対応したことで、俺達はいったい何が嬉しいのか?
smt7174
3
150
Context Engineeringが企業で不可欠になる理由
hirosatogamo
PRO
3
570
ファインディの横断SREがTakumi byGMOと取り組む、セキュリティと開発スピードの両立
rvirus0817
1
1.3k
All About Sansan – for New Global Engineers
sansan33
PRO
1
1.3k
データの整合性を保ちたいだけなんだ
shoheimitani
8
3.1k
SREが向き合う大規模リアーキテクチャ 〜信頼性とアジリティの両立〜
zepprix
0
440
AIと新時代を切り拓く。これからのSREとメルカリIBISの挑戦
0gm
0
900
AIエージェントを開発しよう!-AgentCore活用の勘所-
yukiogawa
0
160
SREのプラクティスを用いた3領域同時 マネジメントへの挑戦 〜SRE・情シス・セキュリティを統合した チーム運営術〜
coconala_engineer
2
640
制約が導く迷わない設計 〜 信頼性と運用性を両立するマイナンバー管理システムの実践 〜
bwkw
3
920
Featured
See All Featured
Heart Work Chapter 1 - Part 1
lfama
PRO
5
35k
Have SEOs Ruined the Internet? - User Awareness of SEO in 2025
akashhashmi
0
270
Building Flexible Design Systems
yeseniaperezcruz
330
40k
技術選定の審美眼(2025年版) / Understanding the Spiral of Technologies 2025 edition
twada
PRO
117
110k
Designing for Timeless Needs
cassininazir
0
130
Building the Perfect Custom Keyboard
takai
2
680
Noah Learner - AI + Me: how we built a GSC Bulk Export data pipeline
techseoconnect
PRO
0
110
Unsuck your backbone
ammeep
671
58k
16th Malabo Montpellier Forum Presentation
akademiya2063
PRO
0
49
Scaling GitHub
holman
464
140k
The browser strikes back
jonoalderson
0
370
Deep Space Network (abreviated)
tonyrice
0
47
Transcript
Akash Patil GETTING STARTED IN INFOSEC Starting our journey
Who am i? Hackerone, Bugcrowd & YesWeHack and VDPS Ethical
Hacker / Bug Bounty Hunter Qseap Infotech Pvt Ltd Information Security Consultant Professional Keyboard Player Graphic Designer
Item 1 Item 2 Item 3 Item 4 Item 5
50 40 30 20 10 0 What is Information Security Becoming a bigger role in daily life. Protecting information assets from unauthorized access, modification, disruption, or any other Unwanted behaviour
Categories of Information Security Network Security Application Security Web Thick-Client
Mobile Security Infrastructure Security Physical Security Cloud Security Automative Security
None
HOW DO I GET INVOLVED? Lets Start
The Hacker Playbook 1 Web Application 101 2 The Web
Application Hackers Handbook 3 Burp Suite Essentials 4 Books
The Hacker News 1 Youtube 2 Google 3 Facebook 4
News
Medium 1 PentesterLand 2 Bug Reader 3 Security Blogs 4
Blogs/Podcasts
1 2 3 4 Create Account Follow peoples in the
industry Participate in the discussion Twitter
Information Security Community The people involved in Information Security Work
for many different companies Collaborate Network Share Information Educate
Certifications CompTIA A+ Network+ Security+ Offensive Security CISSP /eLearn /
TCM OSCP/OSWE eJPT eWAPT PNPT
Overview of Penetration Testing Timeline Given time to test the
application Grey Box / Black Box / White Box Provided by the Client Report Genration Report Writing
Tools Basic Tools Burpsuite Linux Open Source
@skypatil98 twitter
[email protected]
Email Address linkedin.com/in/akashpatil98/ Linkedin Thank you! Feel
free to approach us if you have any questions. https://akashpatil.me Website