Penetration test

Results: 1186



#Item
91Computer security / Domain name system / Footprinting / Computer network security / Internet standards / Black Hat Briefings / Reverse DNS lookup / Penetration test / Domain / Computing / Internet protocols / Internet

SensePost How far can automation be taken? How much intelligence can be embodied in code? How generic can automated IT security assessment tools really be? This presentation will attempt to show which areas of attacks l

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
92Computing / Software testing / ECSA / Penetration test / Certified Ethical Hacker / White hat / Manu Zacharia / ELearnSecurity Certified Professional Penetration Tester / Hacking / Computer security / EC-Council

EC-Council Courses offered at TLC: CEH – Certified Ethical Hacker The Certified Ethical Hacker class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They w

Add to Reading List

Source URL: www.tlclasvegas.com

Language: English - Date: 2014-07-17 13:50:45
93Education / ECSA / Certified Hacking Forensic Investigator / Certified Ethical Hacker / Certified Information Systems Security Professional / CompTIA / Penetration test / Computer security / Computer network security / Computing

Cyber Security Warrior Program CompTIA – EC Council – ISC2 Certificate of Completion : 240 Clock Hours Overview The objective of this program is to prepare students to build a successful career in Cyber Security. Thi

Add to Reading List

Source URL: www.tlclasvegas.com

Language: English - Date: 2014-11-01 16:24:53
94Cyberwarfare / Hacking / Software testing / Black Hat Briefings / Penetration test / Application security / Vulnerability / Johnny Long / Cisco Systems / Computing / Computer security / Computer network security

WARNING: Computer and network vulnerabilities will be revealed. Black Hat, Europe’s premier technical ICT security event, returns in 2005 to provide solutions to your security challenges. •Share information with hund

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:16
95Fish / Cone penetration test / Shark

Geomil message to CPT mariners and other interested Please find below a short message on the successfully commissioned Geomil SHARK system last month. Geomil was approached by a client to advice about the possibilities o

Add to Reading List

Source URL: www.geomil.com

Language: English - Date: 2014-07-25 06:33:45
96Security / Software testing / Data security / Metasploit Project / Rapid7 / Information security / Vulnerability / Penetration test / Security risk / Computer security / Computer network security / Cyberwarfare

Risk Visibility and Management: How IT Security Teams Can Enable Speed With Control The world rotates around the sun at a speed of 67,000 miles per hour. That can feel slow when compared to how fast organizations need t

Add to Reading List

Source URL: www.aquion.com.au

Language: English - Date: 2014-03-26 20:54:42
97Cyberwarfare / Security / Hacking / Penetration test / Electronic commerce / Vulnerability / Quality assurance / Security testing / SAINT / Software testing / Computer security / Computer network security

PDF Document

Add to Reading List

Source URL: www.ambersail.com

Language: English - Date: 2015-03-17 07:41:04
98ISECOM / Prevention / Penetration test / Public safety / Pete Herzog / Data security / Information security / Test automation / Software testing / Security / Computer security

INSTITUTE FOR SECURITY AND OPEN METHODOLOGIES OSSTMM 2.1. Open-Source Security Testing Methodology Manual Created by Pete Herzog

Add to Reading List

Source URL: www.tecnoteca.it

Language: English - Date: 2008-12-29 06:35:07
99Software testing / Risk / Hacking / Technology / Vulnerability / CVSS / Social vulnerability / SCADA / Penetration test / Computer security / Cyberwarfare / Computer network security

QSec: Supporting Security Decisions on an IT Infrastructure F.Baiardi, F. Corò, F. Tonelli, Dip. di Informatica, Univ. di Pisa L Guidi

Add to Reading List

Source URL: www.critis2013.nl

Language: English - Date: 2013-09-21 09:55:13
100Firestop / Fire test / Penetration / Passive fire protection / Architecture / Construction

NSW Building Regulation Advisory Note BRAN No. 236 Contact: Building Systems Unit Phone: Fax:

Add to Reading List

Source URL: www.planning.nsw.gov.au

Language: English - Date: 2009-05-27 21:21:23
UPDATE