Enviar pesquisa
Carregar
Social Engineering si etica hackingului
•
0 gostou
•
326 visualizações
Tudor Damian
Seguir
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 239
Baixar agora
Baixar para ler offline
Recomendados
Spargerea parolelor folosind GPU
Spargerea parolelor folosind GPU
Radu Potop
Alternative Open Source pentru mediul de afaceri
Alternative Open Source pentru mediul de afaceri-solepad-tm-20mai2010
Alternative Open Source pentru mediul de afaceri-solepad-tm-20mai2010
Agora Group
Proiect 10B - Bocioacă Necula
Proiect 10B - Bocioacă Necula
Andreea Bocioaca
A treia parte a cursului de White Hat Hacking tinut de Tudor Damian - ITSpark (Cluj-Napoca, 20 noiembrie 2010)
Curs White Hat Hacking #3 - ITSpark
Curs White Hat Hacking #3 - ITSpark
ITSpark Community
Prima parte a cursului de White Hat Hacking tinut de Tudor Damian - ITSpark (Cluj-Napoca, 6 noiembrie 2010)
Curs White Hat Hacking #1 - ITSpark
Curs White Hat Hacking #1 - ITSpark
ITSpark Community
The payoff of successful Digital Transformation can be essential for companies engaged in highly-competitive markets. Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud. Based on real-life projects and experience from recent years, this session provides a quick insight into the role that the Cloud plays within Digital Transformation initiatives, touching on challenges companies usually face when dealing with governance, security, change management & cost-control. Examples and case studies included.
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Tudor Damian
Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked. While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives. With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud.
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
Tudor Damian
With cybersecurity threats changing rapidly, we definitely need a new set of tools to be able to prevent and address them more efficiently: malware is becoming more complex and harder to detect, malicious insider attacks are on the rise and zero-day exploits make their way to the public much quicker than before. Join this session to see how Windows Server 2016 and Windows 10 can help organizations deal with this ever-changing security ecosystem by providing them with ways to better secure their environment and data. We’ll touch on topics such as malware & threat resistance, identity & access control, virtualization-based security, configurable code integrity, remote attestation and a few others.
Modern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with them
Tudor Damian
Recomendados
Spargerea parolelor folosind GPU
Spargerea parolelor folosind GPU
Radu Potop
Alternative Open Source pentru mediul de afaceri
Alternative Open Source pentru mediul de afaceri-solepad-tm-20mai2010
Alternative Open Source pentru mediul de afaceri-solepad-tm-20mai2010
Agora Group
Proiect 10B - Bocioacă Necula
Proiect 10B - Bocioacă Necula
Andreea Bocioaca
A treia parte a cursului de White Hat Hacking tinut de Tudor Damian - ITSpark (Cluj-Napoca, 20 noiembrie 2010)
Curs White Hat Hacking #3 - ITSpark
Curs White Hat Hacking #3 - ITSpark
ITSpark Community
Prima parte a cursului de White Hat Hacking tinut de Tudor Damian - ITSpark (Cluj-Napoca, 6 noiembrie 2010)
Curs White Hat Hacking #1 - ITSpark
Curs White Hat Hacking #1 - ITSpark
ITSpark Community
The payoff of successful Digital Transformation can be essential for companies engaged in highly-competitive markets. Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud. Based on real-life projects and experience from recent years, this session provides a quick insight into the role that the Cloud plays within Digital Transformation initiatives, touching on challenges companies usually face when dealing with governance, security, change management & cost-control. Examples and case studies included.
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Tudor Damian
Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked. While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives. With the emergence of the Cloud, IT risk has suffered yet another radical transformation. The past couple of years have also brought along new vulnerabilities, exploits, and attack methods, as well as new data privacy requirements such as the GDPR. While all of these things require significant changes to any existing processes and tools, they mostly require a different approach when catering to people's IT security awareness, especially when moving to the Cloud.
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
Tudor Damian
With cybersecurity threats changing rapidly, we definitely need a new set of tools to be able to prevent and address them more efficiently: malware is becoming more complex and harder to detect, malicious insider attacks are on the rise and zero-day exploits make their way to the public much quicker than before. Join this session to see how Windows Server 2016 and Windows 10 can help organizations deal with this ever-changing security ecosystem by providing them with ways to better secure their environment and data. We’ll touch on topics such as malware & threat resistance, identity & access control, virtualization-based security, configurable code integrity, remote attestation and a few others.
Modern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with them
Tudor Damian
The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach, especially after some of last years' heavily publicized cyber breaches. Join this session for a high-level overview on the industry trends in the area of web application security, and find out why security is bound to become a hot topic in any organization developing or using web applications.
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
Tudor Damian
Introducing Microsoft Azure Stack
Microsoft Azure Stack
Microsoft Azure Stack
Tudor Damian
The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach when it comes to security, especially after some of last years’ heavily publicized incidents. Join this session for a discussion on what Microsoft is doing to protect against these new security threats with fresh approaches taken both at the server & client OS level, as well as in Azure.
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Tudor Damian
Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked. While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives. This session intends to address business risks related to the use of IT, looking at industry standards, frameworks and best practices, as well as focusing on real world examples and specific plans on how to implement IT Risk Management on every level of your company.
IT Risk Management
IT Risk Management
Tudor Damian
There is no doubt that Intrusion Detection Systems should be incorporated into any security infrastructure, however today’s IDS implementations are far from perfect. Security Managers should continue to add layers to their defense strategy and not place too much reliance on this technology, as it’s not easy to create a system that can effectively flag an attack without crashing under the weight of its own logs, operate relatively maintenance free and respond appropriately to benign anomalous events without raising too many false alarms. This session discusses some of the most common techniques aimed at evading IDS detection order to easily attack the infrastructure sitting behind those systems.
IDS Evasion Techniques
IDS Evasion Techniques
Tudor Damian
DefCamp #5, Bucharest, November 29th Just as a chain is as weak as its weakest link, computer systems are as vulnerable as their weakest component – and that’s rarely the technology itself, it’s more often the people using it. This is precisely why it’s usually easier to exploit people’s natural inclination to trust than it is to discover ways to hack into computer systems. As the art of manipulating people into them giving up confidential information, Social Engineering has been a hot topic for many years. This session will discuss some of the most common Social Engineering techniques and countermeasures.
Social Engineering, or hacking people
Social Engineering, or hacking people
Tudor Damian
Azure Site Recovery is a cloud-based service that automates virtual machine fail-over across sites. The service integrates with Virtual Machine Manager which manages on-premises Hyper-V servers. Hyper-V Replica technology replicates virtual machine configuration and data across sites. Based on customer feedback, support for SAN replication is important. This session covers the scenarios in scope, solution architecture, and SAN integration using SMI-S.
Azure Site Recovery and System Center
Azure Site Recovery and System Center
Tudor Damian
Learn about the functionality and processes that are available to enable you to move your private cloud deployments to Windows Server 2012 R2 with zero downtime. Understand the options that are available to you and the considerations that need to be made as you determine the best path for continuing to keep your environment on the best technology available for private clouds today. This session covers the end to end approach including Hyper-V, Clustering, Storage and SCVMM.
Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2
Tudor Damian
One of my sessions at Microsoft Summit 2013
What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2
Tudor Damian
One of my sessions at Microsoft Summit 2013
Comparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware Cloud
Tudor Damian
A brief overview of the new features in Windows 8.
What's new in Windows 8
What's new in Windows 8
Tudor Damian
MS Days 2012, Bulgaria
Linux on Hyper-V
Linux on Hyper-V
Tudor Damian
MS Days 2012, Bulgaria
Private cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the Ugly
Tudor Damian
Hyper-V 3.0 Overview
Hyper-V 3.0 Overview
Tudor Damian
Balkan Olympiad in Informatics
BOI 2011 - Be what's next
BOI 2011 - Be what's next
Tudor Damian
Prezentarea de la Future Hosting Conference 2010, despre virtual private cloud deployments
Hosting your virtual private cloud
Hosting your virtual private cloud
Tudor Damian
O scurta introducere in arhitectura Hyper-V R2 si Linux Integration Services v2.1, precum si o detaliere a unor solutii de management si instrumente utile in gazduirea sistemelor Linux sub Hyper-V - video screencast pe Vimeo: http://www.vimeo.com/15466169
Linux sub Hyper-V R2
Linux sub Hyper-V R2
Tudor Damian
Curs White Hat Hacking, partea a 3-a
White Hat Hacking #3
White Hat Hacking #3
Tudor Damian
Curs White Hat Hacking, partea 1
White Hat Hacking #1
White Hat Hacking #1
Tudor Damian
Curs White Hat Hacking, partea a 2-a
White Hat Hacking #2
White Hat Hacking #2
Tudor Damian
Mais conteúdo relacionado
Mais de Tudor Damian
The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach, especially after some of last years' heavily publicized cyber breaches. Join this session for a high-level overview on the industry trends in the area of web application security, and find out why security is bound to become a hot topic in any organization developing or using web applications.
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
Tudor Damian
Introducing Microsoft Azure Stack
Microsoft Azure Stack
Microsoft Azure Stack
Tudor Damian
The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach when it comes to security, especially after some of last years’ heavily publicized incidents. Join this session for a discussion on what Microsoft is doing to protect against these new security threats with fresh approaches taken both at the server & client OS level, as well as in Azure.
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Tudor Damian
Almost every business decision requires executives and managers to balance risk and reward, and efficiency in that process is essential to an enterprise’s success. Too often though, IT risk (business risk related to the use of IT) is overlooked. While other business risks such as market, credit and operational risks have long been incorporated into the decision-making processes, IT risk has usually been relegated to technical specialists outside the boardroom, despite falling under the same risk category as other business risks: failure to achieve strategic objectives. This session intends to address business risks related to the use of IT, looking at industry standards, frameworks and best practices, as well as focusing on real world examples and specific plans on how to implement IT Risk Management on every level of your company.
IT Risk Management
IT Risk Management
Tudor Damian
There is no doubt that Intrusion Detection Systems should be incorporated into any security infrastructure, however today’s IDS implementations are far from perfect. Security Managers should continue to add layers to their defense strategy and not place too much reliance on this technology, as it’s not easy to create a system that can effectively flag an attack without crashing under the weight of its own logs, operate relatively maintenance free and respond appropriately to benign anomalous events without raising too many false alarms. This session discusses some of the most common techniques aimed at evading IDS detection order to easily attack the infrastructure sitting behind those systems.
IDS Evasion Techniques
IDS Evasion Techniques
Tudor Damian
DefCamp #5, Bucharest, November 29th Just as a chain is as weak as its weakest link, computer systems are as vulnerable as their weakest component – and that’s rarely the technology itself, it’s more often the people using it. This is precisely why it’s usually easier to exploit people’s natural inclination to trust than it is to discover ways to hack into computer systems. As the art of manipulating people into them giving up confidential information, Social Engineering has been a hot topic for many years. This session will discuss some of the most common Social Engineering techniques and countermeasures.
Social Engineering, or hacking people
Social Engineering, or hacking people
Tudor Damian
Azure Site Recovery is a cloud-based service that automates virtual machine fail-over across sites. The service integrates with Virtual Machine Manager which manages on-premises Hyper-V servers. Hyper-V Replica technology replicates virtual machine configuration and data across sites. Based on customer feedback, support for SAN replication is important. This session covers the scenarios in scope, solution architecture, and SAN integration using SMI-S.
Azure Site Recovery and System Center
Azure Site Recovery and System Center
Tudor Damian
Learn about the functionality and processes that are available to enable you to move your private cloud deployments to Windows Server 2012 R2 with zero downtime. Understand the options that are available to you and the considerations that need to be made as you determine the best path for continuing to keep your environment on the best technology available for private clouds today. This session covers the end to end approach including Hyper-V, Clustering, Storage and SCVMM.
Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2
Tudor Damian
One of my sessions at Microsoft Summit 2013
What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2
Tudor Damian
One of my sessions at Microsoft Summit 2013
Comparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware Cloud
Tudor Damian
A brief overview of the new features in Windows 8.
What's new in Windows 8
What's new in Windows 8
Tudor Damian
MS Days 2012, Bulgaria
Linux on Hyper-V
Linux on Hyper-V
Tudor Damian
MS Days 2012, Bulgaria
Private cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the Ugly
Tudor Damian
Hyper-V 3.0 Overview
Hyper-V 3.0 Overview
Tudor Damian
Balkan Olympiad in Informatics
BOI 2011 - Be what's next
BOI 2011 - Be what's next
Tudor Damian
Prezentarea de la Future Hosting Conference 2010, despre virtual private cloud deployments
Hosting your virtual private cloud
Hosting your virtual private cloud
Tudor Damian
O scurta introducere in arhitectura Hyper-V R2 si Linux Integration Services v2.1, precum si o detaliere a unor solutii de management si instrumente utile in gazduirea sistemelor Linux sub Hyper-V - video screencast pe Vimeo: http://www.vimeo.com/15466169
Linux sub Hyper-V R2
Linux sub Hyper-V R2
Tudor Damian
Curs White Hat Hacking, partea a 3-a
White Hat Hacking #3
White Hat Hacking #3
Tudor Damian
Curs White Hat Hacking, partea 1
White Hat Hacking #1
White Hat Hacking #1
Tudor Damian
Curs White Hat Hacking, partea a 2-a
White Hat Hacking #2
White Hat Hacking #2
Tudor Damian
Mais de Tudor Damian
(20)
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
Microsoft Azure Stack
Microsoft Azure Stack
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
IT Risk Management
IT Risk Management
IDS Evasion Techniques
IDS Evasion Techniques
Social Engineering, or hacking people
Social Engineering, or hacking people
Azure Site Recovery and System Center
Azure Site Recovery and System Center
Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2
What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2
Comparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware Cloud
What's new in Windows 8
What's new in Windows 8
Linux on Hyper-V
Linux on Hyper-V
Private cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the Ugly
Hyper-V 3.0 Overview
Hyper-V 3.0 Overview
BOI 2011 - Be what's next
BOI 2011 - Be what's next
Hosting your virtual private cloud
Hosting your virtual private cloud
Linux sub Hyper-V R2
Linux sub Hyper-V R2
White Hat Hacking #3
White Hat Hacking #3
White Hat Hacking #1
White Hat Hacking #1
White Hat Hacking #2
White Hat Hacking #2
Social Engineering si etica hackingului
1.
salut.
2.
cine sunt eu?
3.
Tudor Damian, MCSA
IT Solutions Specialist tudor.damian@transcent.ro
4.
Tudy :) tudy@tudy.ro www.tudy.ro
5.
despre ce e
vorba?
6.
social engineering
7.
...sau ”hacking people”
8.
etica hackingului
9.
da, există și
așa ceva :)
10.
bun, hai să
începem
11.
Kevin Mitnick
12.
(probabil) cel mai
cunoscut ”hacker” din lume
13.
atât doar că
nu e hacker! :)
14.
e ”social engineer”
Baixar agora