Тёмный

Cracking the Code: The Role of Programming in Information Security 

SANS Cyber Defense
Подписаться 21 тыс.
Просмотров 357
50% 1

In this presentation, we'll explore an unpatched vulnerability within Windows, one that attackers can likely exploit to bypass your defenses. Through the lens of this attack, we'll address a significant question: "Are programming skills a requisite for excelling in the field of information security?"
Recent research indicates that approximately 20% of entry-level positions in information security demand proficiency in programming. Yet, the ongoing debate in online forums highlights the uncertainty surrounding the necessity of coding skills. Join me as we navigate through this discussion, examining the intricate relationship between coding expertise and achieving success in the realm of information security.
Learn more about SEC573 Automating Information Security with Python: www.sans.org/u/1vAq
About the Speaker
Mark Baggett’s first foray into information security was on the receiving end of hacking, and he was amazed by the experience. “The hackers made my computer do stuff that I didn't think was possible,” he says. “It was like magic and I had to know how the trick was done.” He immediately became obsessed with understanding all the tricks, how they worked, and how to prevent them from happening again.
Fast forward to today and Mark’s infosec career spans nearly 30 years with 15 of those years spent teaching for SANS. Mark is currently a senior instructor for SANS and an independent consultant through his company Indepth Defense providing forensics, incident response, and penetration testing services. Mark has also served as the technical advisor to the DoD for SANS since 2011, where he assists various government organizations in the development of information security capabilities.

Наука

Опубликовано:

 

16 апр 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии    
Далее
What Is a Prompt Injection Attack?
10:57
Просмотров 134 тыс.
98% Cloud Cost Saved By Writing Our Own Database
21:45
Просмотров 321 тыс.
Breach Data Infrastructure
31:24
Просмотров 529
The Secret to Vulnerability Management
58:18
Просмотров 19 тыс.
A View From the Trenches
27:01
Просмотров 233
Телефон-електрошокер
0:43
Просмотров 428 тыс.
Треш ПК за 420 000 рублей
0:59
Просмотров 256 тыс.
Battery  low 🔋 🪫
0:10
Просмотров 7 млн