1. Great Tools for Securing and Testing Your Network By DR RICHMOND ADEBIAYE, CISSP, CISM Presented at NASA Conference (EOSDIS) NASA Risk Management Conference VII (Environment…
Slide 1 1 Index What is penetration testing ? Why conduct a penetration testing? What can be tested ? What is metasploit ? What is an exploit ? What is payload ? What is…
1. Ivan Sanders Ivan Sanders is a SharePoint MVP/MCT Author and independent consultant with more than 15 years of broad-based hands-on experience with the design and development…
Social Engineering Toolkit Author: 3psil0nLaMbDa a.k.a Karthik R, INDIA http://www.epsilonlambda.wordpress.com The social engineering toolkit is a project named Devolution,…
Slide 1 Phishing Attacks & Defense! Slide 2 Who am I? Michael LaSalvia Has been in the information security industry for over 10 years and has worked for several fortune…
Slide 1 Pen Testing with Iron Andrew Wilson Trustwave SpiderLabs Slide 2 Ubiquitous Hello Application Security Consultant Ex-Software Developer– Microsoft MVP Long walks…