You cannot register anymore for this webinar

Cybersecurity Webinar Part 3/3

During this third webinar we are going to review the "exploitation methodology" used by hackers. We walk through the typical steps in exploitation of the Internet-facing resources such as web applications and infrastructure. The participants would also learn about technical and non-technical tools and techniques used by attackers. We shall touch the subject of preventing software vulnerabilities by integrating security to the software development lifecycle (SDLC).


Agenda:
- The methodology: something similar for hackers and penetration testers
- Reviewing the key steps in exploitation:
    - Information discovery
    - Target scanning
    - Vulnerability assessment
    - Exploiting weaknesses
    - Privilege escalation and lateral movements
    - Retaining access
    - Covering tracks
- Non-technical methods: social engineering
- Secure SDLC
- Q&A

​​​​​​​

Presentated by
Aleksander Gorkowienko - Spirent's cybersecurity advocate, trainer and speaker with more than 20 years of practice in the security business
​​​​​​​
When
​​​​​​​
November 24 - 11h00

Duration
1 hour

Format
• Presentation
• Q & A

You can view this webinar from your computer, tablet or mobile phone.


Share this webinar