Sign up or log in to watch the video
The attacker's footprint
Antonio de Mello & Amine Abed - 3 years ago
Have you ever wonder how attacking web applications looks like? How would you retrace the attacker’s steps in order to identify what has been done? In this workshop, you will have the chance to understand everything from both the attacker’s and the defender’s perspective, allowing you to actively participate in the process, breaking down the reasoning behind the decisions that eventually, will lead the application to be compromised. The aftermath will be a detailed analysis through all the breadcrumbs left by the attacker, resulting in its footprint.
Jobs with related skills
IT-Secu­rity Admi­nis­trator (m/w/d)
Techniker Krankenkasse
·
26 days ago
Hamburg, Germany
Hybrid
Newest jobs
Solu­tion Archi­tect SAP (m/w/d)
Techniker Krankenkasse
·
2 days ago
Hamburg, Germany
Hybrid
IT Demand & Project Manager
Hubert Burda Media
·
2 days ago
Dresden, Germany
+1
Hybrid
Platform Engineer (m/w/d)
Dirk Rossmann GmbH
·
3 days ago
Burgwedel, Germany
Hybrid
Related Videos