When Applications Attack!

In this webinar we will discuss some of the various attacks Security professionals need to be aware of in order to protect their company from attacks on their personnel, back-end systems and Web applications. We'll discuss how these attacks are carried out, how to defend against them, and how to recognize them before it's too late. In addition to a broad overview encompassing many of the top hacking techniques, this webinar will walk you through the specific attacks vectors favored by hackers including URL manipulation, command injection, directory traversal, cross-site scripting, and SQL injection.

Recorded: 3/23/2016


Ryan Hendricks

Ryan Hendricks is an experienced instructor who teaches networking and security courses to IT professionals throughout the nation. He currently has the CompTIA Certified Technical Trainer (CTT+ Classroom) and the Cisco Certified Academy Instructor (CCAI) credentials. He holds certifications from (ISC)2, EC-Council, CompTIA, and Cisco. When not on the podium instructing, he delves into IT books, always looking to learn more and keep up with the latest security topics.