what value does this video provide that the portswagger site doesn't?
@misstennisha6 ай бұрын
what value does your comment add when no one cares about your opinion? if it’s not for you, move on bruh
@dvorakgigachad14446 ай бұрын
@@misstennisha bro when your dad played 'got your nose' it fell down cause it was too heavy for him
@misstennisha6 ай бұрын
@@dvorakgigachad1444 clever guy, that’s cute. now go be racist/sexist and a bigot elsewhere.
@misstennisha6 ай бұрын
i think they might be too easy but you could def include them in your star stories
@TheClassyHacker6 ай бұрын
Would those labs be good to put on a resume or are they too simple?
@UpgradingJeff6 ай бұрын
Easy to say that there are criminals around during hacker week. Its obvious that Caesars believes that the hack was from someone at the Conference. That is why the location was changed.
@VWonder7379 ай бұрын
Damn, Doc. You did that!✊🏾
@VWonder7379 ай бұрын
Voorhees is university now. Interesting.
@shanderiarichardson42649 ай бұрын
Wow! That’s awesome 👏🏾
@aprilfrost3530 Жыл бұрын
Don't forget to request that your public library carry this valuable book!
@theshyhat Жыл бұрын
Happy new year! 2024 is going to be a great one!
@supergames430 Жыл бұрын
Happy new year ❤ if you try one time SEO i think it's growup your youtube channel
@TheClassyHacker Жыл бұрын
Happy new year 🎉
@Theinsomniac826 Жыл бұрын
Happy New Year
@shanderiarichardson4264 Жыл бұрын
Awesome. 👏🏾 Happy New Years🎉
@samanthahaley6093 Жыл бұрын
☺️ 'Promo SM'
@tonybtheworldofit248 Жыл бұрын
Love this!
@MAG320 Жыл бұрын
Hi There. Right now there is Cyber Warfare happening between Russia & Ukraine & Ukraine is asking for a lot more hackers. If you can train as many Black Women as you can to help fight in the CyberWar, it would be much appreciative.
@SolitaryElite Жыл бұрын
lmao thats so cringe
@brenfromNYU Жыл бұрын
LETS GOOO
@malikgirondin Жыл бұрын
Thank you for having me! I enjoyed this Lunch 'n' Learn with the crowd!
@shanderiarichardson4264 Жыл бұрын
🔥🔥🔥
@PrettyWomen-zx7eh Жыл бұрын
Im not fucking black
@TheGripMuse2 жыл бұрын
First female hacking channel I've seen. It's pretty lit 🔥
@blackgirlshack2 жыл бұрын
welcome!
@virgobeautygg2 жыл бұрын
Dimples and Brillance! Win win!
@tawnyarhorer50172 жыл бұрын
💖 𝘱𝘳𝘰𝘮𝘰𝘴𝘮
@jonbikaku61332 жыл бұрын
The indian guy(totally assuming) seemed very bored and barely provided any explanation to what's going on or what's needed to be done. If he's your instructor he shouldnt be lol
@wardtafes65422 жыл бұрын
Felicidades, es un buen ejemplo. 205 sentadillas son unos XXXGIRLS.Uno muchas y un buen ejercicio. Se deja ver que hay muy buenos resultados 😍👍 Saludos desde la Cd.. de world 🌹😉💖 los mortalesb abian apreciado tan hermosa mujer.k
@drbHacking2 жыл бұрын
Really enjoyed this! Starts @ 4:34
@rprince98073 жыл бұрын
Is there a follow up video to this?
@thesweatysteve3 жыл бұрын
Did you/you all take the test? Loved the vid!
@khayla_matthews3 жыл бұрын
10:55 - Talk objectives and speaker introduction 13:30 - About Damilare 14:38 - Why Do We Threat Modell? - 15:30 - Threat modeling is intuitive. Though technology changes, the principles underlying cybersecurity do not. - 16:01 - 2015 Jeep Hack as an example of a design problem that became a security issue. - 17:49 - Another illustration of a design problem versus a code problem. 18:43 - What is Threat Modeling? (Risk Assessment model) - 20:49 - Start with architecture, which is the blueprint. - 22:21 - Define assets. What do attackers value in order to hurt the company? - 23:20 - Identify potential threats. What kind of attacks are available against the assets? - 23:52 - Attack surfaces. Where information flows into the system. Illustration provided. - 25:31 - Mitigations. How to protect assets? - 25:41 - Security requirements. Implementations in the system for security. - 26:22 - Revisit/Revise 27:40 - Audience Question: What does the Risk Assessment model look like in practice? How are assets shown? Answer at 28:30 29:55 - Audience Question: Do you communicate with IT and Business or just primarily IT? Answer at 30:09. It depends on the company. 31:53 - WeDo Template for SaaS Project Management System - 32:17 - Threat modeling should happen once there’s a concept for a software project and a stable architecture. 33:17 - Security Goals (and blindspots/risks); there are many different ways to threat model 35:02 - Web Application Architecture There were talks of a part 2 at some point of this presentation. 57:09 - Audience Questions - 57:27 - How did you get started in this field? - 59:37 - General career tips (leverage your gifts, what to do when your gifts don’t match the job market, how Damilare knew when he had found his gift) Such an awesome presentation. Can't wait for part two!
@TwoFiveSoulja3 жыл бұрын
✊🏾✊🏾✊🏾✊🏾✊🏾
@GilligansTravels3 жыл бұрын
cool
@ellie43953 жыл бұрын
Love this!
@amarchhabra21753 жыл бұрын
Content starts at 11:20
@KottonKandy3 жыл бұрын
Another great presentation, Tennisha!
@rooob87343 жыл бұрын
Love the talent, and the empowerment between the two of these ladies!
@natedowd26823 жыл бұрын
Hey Tennisha I don't see the facebook Pcap in the files
@Mdmeskywlkr0073 жыл бұрын
Another great Bring a Hacker to work day! BGH is undefeated rn. Thanks for this heat!
@devsecfranklin3 жыл бұрын
This is great! :)
@pjowen74503 жыл бұрын
Nice channel. You deserve more subs. You should look into using smzeus"dot"com!! It’s a handy tool to have when you’re trying to grow your social media, KZbin videos, website etc!!!
@devsecfranklin3 жыл бұрын
Totally agree on the need for strong Google Fu. It's how the tech research gets done most of the time!