Your boss corners you at the coffee pot and says, "Did you see the news? Our competition got hacked into and company secrets were stolen. I want you to test our networks and report back to me on how safe they are." Because of the pressure of regulatory compliance and increasing activity by cyber-criminals, many organizations are turning to penetration testing.
Penetration testing goes beyond a vulnerability assessment by exploiting vulnerabilities to learn how an a bad actor may get access to key systems and confidential files.
This session shows you how to evaluate your security posture using the same process skilled bad actors use. You will see how to perform reconnaissance, exploit hosts, and manuver deeper into your network using the premier penetration testing tool, Metasploit.
Metasploit is an open source exploit development framework created by H. D. Moore.