Paul Asadoorian and Matt Alderman of Security Weekly join Core Security cybersecurity experts for a live demonstration of Core Impact.
Core Impact version 19.1 has new functionality for web applications testing, along with enhancements made to all other attack vectors. Additionally, updates have been made to local information gathering modules, as well as libraries and embedded features.
The video below highlights the other new features for performing penetration tests.
Phishing has been around almost as long as the Internet. While some attempts can be spotted a mile away, others have grown increasingly sophisticated. Even the best enterprise spam filters can’t catch every malicious communication. Unfortunately, a single careless click from an employee can have devastating consequences for the entire organization.
But what’s the best way to improve employee awareness?
In this webinar, we’ll show you tips and tricks from an experienced pen tester and user of Core Impact.
Can you count to six? If so, you too could be a Pen Tester.
Start watching now to learn the six fundamental steps of running a network penetration test.
In this webinar, we’ll show you how you can leverage Core Impact’s scripting capabilities to build custom setup workflows to make your engagements go more smoothly and efficiently.
Are you testing your network for vulnerabilities? A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. Watch for 8 tips to help you get the most out of your penetration testing tool.
Pagination
- Previous page
- Page 35
- Next page