Ethical Hacking and Risk Assessments
![Cover Image](https://cdn.ttgtmedia.com/bitpipe/covers/1228934768_811_lg.jpg)
Attend this webcast to learn about:
- Risk assessment process and tools used by ethical hackers
- Tools commonly used at each step of the process and how they can help you secure the infrastructure
- Examine open-source and commercial tools such as Metasploit, core Impact, and the Exploitation Framework