Play by Play: Ethical Hacking with Troy Hunt

Delve into some of today's most common attacks and vulnerabilities with web security expert Troy Hunt.
Course info
Rating
(397)
Level
Beginner
Updated
Dec 4, 2015
Duration
1h 2m
Table of contents
Description
Course info
Rating
(397)
Level
Beginner
Updated
Dec 4, 2015
Duration
1h 2m
Description

In this Play by Play, Troy Hunt will show how easy it is for a victim to fall prey to an attack. When all is said and done, you should understand how important it is to be prepared for these attacks and know the right steps to mitigate them in the first place.

About the author
About the author

Gary Eimerman is VP of IT Pro Content at Pluralsight. He brought his expertise over from TrainSignal, where he spent eight years helping to grow the company into the leader in online IT training.

More from the author
More courses by Gary Eimerman
About the author

Troy Hunt is a Microsoft Regional Director and MVP for Developer Security. He's a regular conference speaker, frequent blogger at troyhunt.com and is the creator of the data breach notification service known as “Have I Been Pwned”.

More from the author
Modern Browser Security Reports
Beginner
57m
3 Aug 2018
More courses by Troy Hunt
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Welcome, and I'm Gary Eimerman, and this is Play by Play at Pluralsight. This is a series where we give you a rare view into the workflows and thought process of top admins, developers, and designers. Have you ever wished you could watch one of your tech heroes work on a project on their own time, using their own tools, at their natural speed? Not a rehearsed presentation or a prepared course, but planning and problem solving as it happens in the real world every day. That's what we do in this series. We give talented admins, developers, and designers a task to work on, live and unrehearsed, for about 2 hours. We talk through architecture decisions and fix unexpected problems. This isn't a tutorial. We won't pause to explain how to set up server infrastructure or development environment, but you will see how professionals use tools in their everyday environments. In this session, I have the great pleasure to sit down with security expert and Microsoft MVP Troy Hunt. We discuss some ethical hacking techniques with Troy as he shares with us some very easy exploits and how to address them in our environments. We hope you can learn from some of these techniques to help secure your own environments.