Ethical Hacking: Creating a Shadow

As an ethical hacker, perhaps the most effective way to learn about someone's unusual behavior is to record everything they are doing on their computer without being detected. Fortunately for you, recording what someone is doing on their computer is not necessarily hard. However, having proper knowledge and tools required to convert the recorded information into some "actionable intel" is a completely different story. During this webinar, we will demonstrate not only how simple it can be to create a log of someone's behavior (also called a shadow) but also how to properly read the output that is generated.

Recorded: 10/28/2015


Rafiq Wayani

Rafiq Wayani has extensive experience including more than 20 years in IT as Systems Architect, Software Engineer, DBA, and Project Manager. Wayani has instructed in a variety of technical areas, has designed and implemented network and information systems, and is certified across a wide range of platforms and systems including Microsoft Solutions Developer, Systems Engineer, Application Developer, Database Administrator, Trainer; Novell Netware Administrator and Engineer; Master Certified Netware Engineer; and A Certified.