Level: Intermediate
Avril Salter
Ph.D.
Principal Technologist
Next Direction Technologies
Ethical hacking is the best way to find vulnerabilities on your network. Use the same tools and processes real hackers would use to conduct an attack. This session explores how hackers work and how they begin their attacks through careful planning. You'll learn how a hacker decides your assets are hack-worthy and how they begin to attack your systems without sending you a single packet. You'll also see how hackers build a network map of your enterprise; just like your own IT department does but for planning an attack on your systems. This session will include demonstrations of live hacking including social media scanning and external network footprinting.
You will learn:
- How to apply hacker techniques to examine a network
- How to determine and prioritize optimal targets for hacking
- How to select the most appropriate attack for a given asset
- How to create and implement an attack plan using hacker methodologies