The Hacker's Fingerprints

Flowmon is trusted by over 1000 customers across 40 countries

Do you know how hackers can gain access to your network? The techniques may vary, but they do leave traces.

  • Presenters: Jindrich Dudek, Ethical Hacker, Tomas Sarocky, Channel & Education Specialist and O.J. Wolanyk, Sales Engineer North America

  • Date: December 10, 2019

  • Time: 1:00 PM (EST) / 10:00 AM (PST)

If you’re curious how they do it, join our webinar and see what techniques hackers use and what traces they leave in network traffic.


We will explore several hacking scenarios and learn about DHCP and DNS spoofing, what port scanning does, or how a trusted encryption certificate can be replaced with a fake one.


But we will also see what activity can be uncovered by anomaly detection and how much root-cause analysis can tell us about the infiltrator’s movements.


Come and see how easy it is to get hacked.

Don't Hesitate to Ask

In case of troubles with registration, contact us