From the course: Introduction to Pen Testing for Cybersecurity Professionals
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Checking physical security
From the course: Introduction to Pen Testing for Cybersecurity Professionals
Checking physical security
- [Instructor] Physical access can be an entry point into your organization and the first step in a data breach. In this segment, we'll discover what methods should be in place to stop a would-be attacker from gaining access to your systems. With all the logical controls in place, testing for physical security might not be the first thing that comes to mind when conducting a pen testing exercise. However, checking the physical security of an organization should be part of an overall assessment. If I have physical access, I might be able to bypass the logical controls. For example, if you have a router that uses Wi-Fi protected setup, or WPS, this makes the process of connecting to a secure wireless network from a computer or other device easier. I'm at this website where it shows you how you can press the EPS button on your router to allow push and connect, and I'll scroll down where you can see some examples. That…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Checking physical security3m 44s
-
(Locked)
Identifying wireless vulnerabilities3m 48s
-
(Locked)
Testing the website3m 24s
-
(Locked)
Leaking data via email or VoIP3m 36s
-
(Locked)
Safeguarding cloud services3m 56s
-
(Locked)
Assessing the mobile infrastructure2m 40s
-
(Locked)
Hacking the human3m 25s
-
(Locked)
-
-