This resource is no longer available
Attend this webcast to learn about:
- Risk assessment process and tools used by ethical hackers
- Tools commonly used at each step of the process and how they can help you secure the infrastructure
- Examine open-source and commercial tools such as Metasploit, core Impact, and the Exploitation Framework