IT Dojo: The five phases of a successful network penetration

April 6, 2009, 12:40 AM PST | Length: 434


Understanding how an enemy can penetrate your defenses is critical to effectively protecting your network. In this video, Bill Detwiler discusses the five phases of successful network penetration and covers ways to defend against each type of attack. Once you’ve watched this IT Dojo video, you can find a link to the original TechRepublic article and print the tip from our IT Dojo Blog.