How Hackers & Pen Testers Check for Misconfigurations & Vulnerabilities
About this Webinar
In this on-demand webinar, Enterprise Security MVP and Microsoft Security Trusted Advisor, Paula Januszkiewicz, demonstrates attacker bypassing techniques, discusses the prevention methods admins should use in order to avoid the latest attacks, and explains why vulnerability management is such an important facet to your overall security strategy. Tune in to learn: Different techniques used by hackers that can be useful for reviewing the infrastructure
- Techniques that are useful for administrators
- Weak points that administrators should pay attention to
Take a journey to the darker side of IT security with Paula, and use this knowledge for making good decisions in your enterprise vulnerability management strategy.