IT Dojo: The five phases of a successful network penetration
About
IT Dojo: The five phases of a successful network penetration
Length: 120:33:20 |
Apr 6, 2009
Understanding how an enemy can penetrate your defenses is critical to effectively protecting your network. In this video, Bill Detwiler discusses the five phases of successful network penetration and covers ways to defend against each type of attack. Once you’ve watched this IT Dojo video, you can find a link to the original TechRepublic article and print the tip from our <a href="http://blogs.techrepublic.com.com/itdojo/?p=464">IT Dojo Blog</a>.