Ethical Hacking and Risk Assessments

Ethical Hacking and Risk Assessments

Cover

Attend this webcast to learn about:

 

  • Risk assessment process and tools used by ethical hackers
  • Tools commonly used at each step of the process and how they can help you secure the infrastructure
  • Examine open-source and commercial tools such as Metasploit, core Impact, and the Exploitation Framework

Speaker

Michael Gregg
Vendor:
Global Knowledge
Premiered:
Dec 10, 2008
Format:
Multimedia
Length:
00:21:15 (hh:mm:ss)
Type:
Webcast
Language:
English
Already a Bitpipe member? Login here

Download this Webcast!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy