Do you know how hackers can gain access to your network? The techniques may vary, but they do leave traces.
Presenters: Jindrich Dudek, Ethical Hacker, Tomas Sarocky, Channel & Education Specialist and O.J. Wolanyk, Sales Engineer North America
Date: December 10, 2019
Time: 1:00 PM (EST) / 10:00 AM (PST)
If you’re curious how they do it, join our webinar and see what techniques hackers use and what traces they leave in network traffic.
We will explore several hacking scenarios and learn about DHCP and DNS spoofing, what port scanning does, or how a trusted encryption certificate can be replaced with a fake one.
But we will also see what activity can be uncovered by anomaly detection and how much root-cause analysis can tell us about the infiltrator’s movements.
Come and see how easy it is to get hacked.