The Pen Testing Perfect Storm Webcast Series with Skoudis, Wright, Johnson

UPDATE: Part II Scheduled for Jan 21, 2009. Details coming soon!! 

hurricane.jpgIf Ed Skoudis’ webcast series entitled Penetration Testing Ninjitsu got your blood pumping, then this series will make your brain explode. EH-Net is proud to join forces with SANS and Core Security to bring you an exciting, new webcast series. This idea has been floating around for some time, so I can’t tell you how jazzed I am with the final result.

The first webcast in this series, “Combining Network, Web App and Wireless into the Ultimate Penetration Test,” will take place Oct 15, 2008 @ 1:00 PM EST. Following the webcast, attendees are invited to keep the conversation going with Kevin Johnson, Josh Wright and Ed Skoudis from InGuardians during discussions hosted by The Ethical Hacker Network (EH-Net), a free online magazine for security professionals. For at least one week after each webcast, the crew will make themselves available to answer your questions directly and candidly in EH-Net’s Community Forums. All discussions will remain freely available on EH-Net for your continued reference.

Active Image
Active Image

Discuss in Forums {mos_smf_discuss:News Items and General Discussion About EH-Net}

Combining Network, Web App and Wireless
into the Ultimate Penetration Test

The Pen Testing Perfect Storm webcast series brings you a deluge of security assessment tactics and strategies from the combined forces of three penetration testing heavyweights in the SANS faculty:

  • Kevin Johnson: web guru and senior security analyst with Intelguardians
  • Josh Wright: wireless wizard and senior security researcher with Aruba Wireless Networks
  • Ed Skoudis: network master and co-founder of Intelguardians

This trio of experts will show you how to assess an organization’s real business risks by taking a holistic, comprehensive look at your information security – just as determined and skilled attackers do in the wild. You’ll learn techniques for safely replicating chains of threats that can pivot throughout your infrastructure, including:

  • Web — SQL injection, cross-site scripting, remote file inclusion, etc.
  • Wireless — wireless LAN discovery, crypto and protocol attacks, client duping, etc.
  • Network — port scanning, service compromise, client-side exploitation, etc.

This free webcast series is ideal for anyone seeking to go beyond point-focused, "tunnel-vision" assessments to real-world penetration testing – mimicking the sophisticated, multi-staged threats that pose the most significant information security risks to organizations today.
Sponsored by: Core Security Technologies Core Security Technologies

Register Now!!

Pen Testing Perfect Storm Webcast Series: Part I

Join the Convo HERE!
Q&A in EH-Net Community Forums

Copyright ©2021 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.


Sign in with Caendra

Forgot password?Sign up

Forgot your details?