Join me and Netwrix in this practical webinar series about cyber-security. These three webinars walk you through the hacking process, some techniques hackers use once inside your network, and the tools and techniques you can use to defend your IT environment. At the end of the three-webinar series, you will have a better understanding of your organization’s cyber-security posture and be able to improve your protection strategy.
April 12th, 2018 – 2PM EST
Session 1: Initial compromise: How attackers break in
Today, hacking tools are so easy to find and use that attackers no longer need specialized skills and knowledge; they simply deploy the tool of their choice. As a result, attacks are more frequent than ever, and it’s critical for internal information technology and security teams to spot them quickly. The key to protecting your environment is knowing what types of attacks to look for.
April 24th, 2018 – 2PM EST
Session 2: Hiding in plain sight: How attackers move through the network undetected
Once attackers have breached the perimeter, they often lurk in the network for months, looking for valuable data to steal. To stay hidden, they try to make their actions blend in with normal traffic.
May 8th, 2018 – 2PM EST
Session 3: Privilege escalation: How hackers get elevated permissions
Often, to inflict damage on critical systems or steal the data they want, attackers need administrative-level access. Gaining those permissions is not a simple task, since most operating systems now have built-in protections against privilege escalation. But many attackers do succeed.
Registration can be completed at the following link
You must log in to post a comment.