Avril Salter
Ph.D.
Principal Technologist
Next Direction Technologies
Ethical Hacking is the best way to find vulnerabilities the way real hackers do: by using their tools and processes. This session explores how hackers work and how they begin their attacks through careful planning. You’ll learn how a hacker decides your assets are hack-worthy and how they begin to attack your systems without sending you a single packet. You’ll also see how hackers build a network map of your enterprise… just like your own IT department does but for planning and attacking your systems.
You will learn:
-
How to apply hacker techniques to examine a network
-
How to determine and prioritize optimal targets for hacking
-
How to select the most appropriate attack for a given asset
-
How to create and implement an attack plan using hacker methodologies