Wearing Hacker's Hat: Session 2 - On demand Tes

Read Transcriptions

Video length - 00:59:59

11 attendees

Conducted on - 09 Sep,2019

14 views

About Speaker
Prakhar AgnihotriSoftware Engineer
Prakhar learnt coding as early as when he was in 10th Standard. While others were busy creating things with their coding ability he also focused on breaking things and finding flaws in the code. He honed his skillse...
Have you ever thought of what goes on in the mind of a hacker who breaks applications and runs away with information and money, ruining organization's reputation?
This session will give you a sneak peek inside the mind of a hacker and insight on how to exploit applications. This session will be an eye opener to many of us who thinks enterprise applications are safe behind the firewall and IDS/IPS.
This webinar is the first of a three part series which is lined up in next one month.
Key points of discussion:Getting into Web application vulnerabilitiesGetting into Mobile Application vulnerabilitiesHow to write secure code to avoid vulnerabilitiesLearning about top web application vulnerabilitiesHow to Identify web application vulnerabilitiesLive demo of exploits
Most beneficial for: Developers, QA Testers, System Administrators, Security Analyst/Engineer, IT Managers, Information Security Professionals, Auditors, IT Executives
Key points of discussion
Who should attend
java,c,pp

Tags
HackingSecurityTg32019
This page might use cookies if your analytics vendor requires them. Accept