- Jonathan DouglasDirk Wagner, Thinus Prinsloo (Maltego Technologies)Maltego Teeth Resurrected - Reconnaissance, Exploitation, and Visual Pattern Recognition for the Ethical HackerSarah TyraJuly 31 - August 1 - 16 Credit Hours

Jonathan Douglas
Dirk Wagner, Thinus Prinsloo (Maltego Technologies)
Maltego Teeth Resurrected - Reconnaissance, Exploitation, and Visual Pattern Recognition for the Ethical Hacker
Sarah Tyra
July 31 - August 1 - 16 Credit Hours
Maltego Teeth Resurrected: Reconnaissance, Exploitation, and Visual Pattern Recognition for the Ethical Hacker
Jonathan Douglas
It is common practice for pentesters and threat analysts to mimic the techniques used by real attackers and try to break defenses and find security flaws before actual attackers get the opportunity. In addition, you support mitigating these vulnerabilities and keep an eye on internal network defenses to spot cyber threats at an early stage. These tasks require a deep understandingof how attackers operate and where threats reside. Network monitoring and scanning tools, such as nmap, Metasploit and Wireshark, are mainstays of the network security industry, and knowing how to use them and integrate them into reconnaissance workflows is key to achieving success.In this course, where we combine tool training with a hands-on lab in a live environment and will teach you how to complement the command line tools that you already use. We will show you the power of being able to automate these tasks and visualize your data in an intuitive link analysis software tool.
Skills / Knowledge
- PenTesting
- Forensics
Issued on
August 1, 2021
Expires on
Does not expire