Quick Look: Hacker's Perspective on Your Windows Infrastructure: Mandatory Check List

If there is a weakness in your IT security system, wouldn't it be better to find it before someone else does? As long as we are aware about the value of the resources to be protected, why don't we put ourselves into the hacker's role and perform like they do? You will become familiar with the mandatory tasks that are performed by hackers to check for misconfigurations and vulnerabilities.



Paula Januszkiewicz CEO, Security Expert, Penetration Tester and Trainer, MVP, CQURE Inc.

← View more Videos

This document was retrieved from on Thu, 18 Apr 2019 11:03:34 -0400.