This resource is no longer available

Cover Image

Attend this webcast to learn about:

 

  • Risk assessment process and tools used by ethical hackers
  • Tools commonly used at each step of the process and how they can help you secure the infrastructure
  • Examine open-source and commercial tools such as Metasploit, core Impact, and the Exploitation Framework
Vendor:
Global Knowledge
Premiered:
Dec 10, 2008
Format:
Multimedia
Type:
Webcast

This resource is no longer available.