In this episode, Jeremiah covers one of his most asked questions, how to pivot into the Physical Red Team field. He breaks down a high-level approach to educate yourself on the topics separated into two categories, those with a technical background and those without. Technical Background Penetration Testing BOOK: The Basics of Hacking And Penetration Testing BOOK: Penetration Testing by Georgia Wiedman BOOK: Kali Linux Revealed TRAINING: Penetration Testing Fundamentals (Udemy) TRAINING: Pen Testing with Kali (Offensive Security) ADDITIONAL: Youtube for additional resources Social Engineering BOOK: The Art of Deception by Kevin Mitnick BOOK: https://amzn.to/2H4iFXX (The Social Engineer’s Playbook by me) BOOK: Social Engineering book by Chris Hadnagy TRAINING: https://redteamsecuritytraining.com/social-engineering-expert/?__hstc=4686124.c0c309aa847b6f7827100a285db7c39a.1520009944552.1522690930965.1522694010954.78&__hssc=4686124.3.1522694010954&__hsfp=3183743550 (Social Engineering Expert by me) YOUTUBE: Social engineering content and tool usage (ie: Social Engineer’s Toolkit) Physical Security BOOK: https://amzn.to/2ZxOSkH (Physical Red Team Operations book by me on Amazon) BOOK: Unauthorized Access by Will Allsopp TRAINING: https://redteam-training.thinkific.com/bundles/physical-red-team-operations-master-bundle?__hstc=4686124.cd42b548a67d0f19b61e217b6e8f8282.1587755612288.1589901274568.1589999615509.14&__hssc=4686124.1.1589999615509&__hsfp=3116077354 (Physical Red Team Operations by me) TRAINING: Black Hat Trainings (Caution: often only focuses on lock picking) TRAINING: Military or LE training, if possible (Caution: sometimes far too military leaning) Non-technical Background Information Technology Fundamentals BOOK: CompTIA IT Fundamentals BOOK: CompTIA A+ Study Guide TRAINING: CompTIA IT Fundamentals Cert (ITF+) TRAINING: CompTIA Security+ Cert Training ADDITIONALLY: Search for fundamental courses on Udemy LONG ROUTE: 2-year college program in IT Networking field Information Security Fundamentals BOOK: The Basics of Information Security by Jason Andress BOOK: CompTIA Security+ Study Guide TRAINING: CompTIA Security+ Cert Training ADDITIONALLY: Search for fundamental courses on Udemy LONG ROUTE: 2-year college program in IT Security field Social Engineering BOOK: The Art of Deception by Kevin Mitnick BOOK: https://amzn.to/2H4iFXX (The Social Engineer’s Playbook by me) BOOK: Social Engineering book by Chris Hadnagy TRAINING: https://redteamsecuritytraining.com/social-engineering-expert/?__hstc=4686124.c0c309aa847b6f7827100a285db7c39a.1520009944552.1522690930965.1522694010954.78&__hssc=4686124.3.1522694010954&__hsfp=3183743550 (Social Engineering Expert by me) YOUTUBE: Social Engineering Tools (Social Engineers Toolkit, etc.) OPTIONALLY: Search for HOW-TO courses on social engineering tools Penetration Testing BOOK: The Basics of Hacking And Penetration Testing BOOK: Penetration Testing by Georgia Wiedman BOOK: Kali Linux Revealed TRAINING: Penetration Testing Fundamentals (Udemy) TRAINING: Pen Testing with Kali (Offensive Security) ADDITIONAL: Youtube for additional resources Physical Security BOOK: https://amzn.to/2ZxOSkH (Physical Red Team Operations book by me on Amazon) BOOK: Unauthorized Access by Will Allsopp TRAINING: https://redteam-training.thinkific.com/bundles/physical-red-team-operations-master-bundle?__hstc=4686124.cd42b548a67d0f19b61e217b6e8f8282.1587755612288.1589901274568.1589999615509.14&__hssc=4686124.1.1589999615509&__hsfp=3116077354 (Physical Red Team Operations by me) TRAINING: Black Hat Trainings (Caution: often too focused on lock picking) TRAINING: Military or LE training, if possible (Caution: sometimes far too military leaning) Thanks!
Show more
Show less