Introduction To Ethical Hacking

In this fast-paced presentation, we will take a look behind the scenes at the basic hacking methodology that is often used when conducting a penetration test for an organization. We will walk through the basics the hacking methodology described in the Penetration Testing Execution Framework Including: Pre-Engagement Intelligence Gathering Threat Modeling Vulnerability Analysis Exploitation Post Exploitation Reporting

Audience: Beginner/Introductory

Presented by