sponsored by Global Knowledge
Premiered:  Dec 10, 2008
Format:  Multimedia
Length:  00:21:15 
Type:  Webcast
Language:  English

Attend this webcast to learn about:


  • Risk assessment process and tools used by ethical hackers
  • Tools commonly used at each step of the process and how they can help you secure the infrastructure
  • Examine open-source and commercial tools such as Metasploit, core Impact, and the Exploitation Framework


Michael Gregg

Business Intelligence | Data Security | Hackers | Risk Assessment | Security Event Management | Security Policies

View All Resources sponsored by Global Knowledge

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement