877.791.9571 |

Monthly Archives: August 2010

Ideal Skill Set For the Penetration Testing

Based on questions I’ve gotten over the years and specifically in class, I’ve decided that we need to address some basic skills that every penetration tester should have. While we can’t realistically expect everyone to have the exact same skill set, there are some commonalities.

1. Mastery of an operating […]

Video: Man-in-the-Middle – how it works

This is a step-by-step video of the man-in-the-middle attack. We teach this and much more in our ethical hacking course. We’ll also teach you how to defend against such attacks. For a powerpoint diagram version of the man-in-the-middle attack you can go here.

Video: Ethical Hacking demo – basic client-side attack

By |August 16th, 2010|Hacking|0 Comments

Interview with Mike Rothman

Below is an interview conducted with Mike Rothman. Mike specializes in protecting networks and endpoints, security management, and compliance. He is one of the most sought after speakers and commentators in the security business. After 20 years in and around security, he’s one of the […]

By |August 16th, 2010|Interviews|1 Comment