A Live Hacking Demonstration and Companion Guide

In this on-demand video demonstration and companion guide, watch as a hacker takes complete control of a mobile endpoint system without the proper security protection, and is able to attack and gain access to the mobile endpoint and ultimately the corporate network. These materials will leave you with a better understanding of:

Common security risks and vulnerabilities that threaten today's mobile workforce;
Techniques, skills and tools used by hackers to exploit vulnerabilities on mobile endpoint systems;
Best practices and essential tools necessary (VPN, personal firewall, patch management, anti-spyware and anti-virus protection) to help protect your endpoints and corporate resources from attack. The Anatomy of a Hack. A Live Hacking Demonstration and Companion Guide

Linked by shanmuga Sunday, 18th December 2005 12:10PM