Get Started
Loading Events
This event has passed.

In this scenario, a series of security flaws pertaining to a public web server under your control enables the attacker to exploit the system using SQL injection exploitation techniques. The successful nefarious activities of the attacker pivot to internal systems, extract privileged information and interfere with business processes. Participants will learn to identify the attack through SQL, Firewall and SIEM log analytics and implement controls to block additional data exfiltration, lateral movement and protect the organization from future malicious activity.

Share This Story, Choose Your Platform!

Go to Top