| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Finally, you can manage your Google Docs, uploads, and email attachments (plus Dropbox and Slack files) in one convenient place. Claim a free account, and in less than 2 minutes, Dokkio (from the makers of PBworks) can automatically organize your content for you.

View
 

Francisco Bolaños - Ethical Hacking

Page history last edited by jstratton 9 years, 3 months ago

AASSA Educators’ Conference 2012

Francisco Bolaños

"Ethical Hacking - Applying the Open Source Security Testing Methodology Manual (OSSTMM)"

 

 

  

Presenter Name:  Francisco Bolaños

School/Organization:  Interamerican Academy (Guayaquil, Ecuador)

Presenter Contact Info--Email:     fbolanos@interamerican.edu.ec                                                  

Website:  

 

Presentation Description:  This is going to be a practical workshop in which all the ethical hacking stages will be shown. The stages are:  Tracking, Exploration, Enumeration and Exploitation. The Open Source-Security Testing Methodology Manual OSSTMM will be applied in order to document and log everything in a professional way. This methodology will allow the IT department to monitor and organize all traffic and security issues that take place in the network in the selected device.

 

Date: Friday, March 16, 2012

 

Materials and resources: 



Comments (0)

You don't have permission to comment on this page.