fbpx

About webinar

Cybersecurity may not be as difficult as you think. You just need reliable tools and the ability to use them to ensure that threats are continuously countered. All this is possible with Fortra.  

The online webinar will teach you how to manage vulnerabilities with Fortra Vulnerability Management (VM) and conduct automatic pen tests with Core Impact. We will discuss the separate processes of vulnerability management and pen testing and consider the advantages of combining them for a comprehensive threat assessment.  

You will see the tools’ capabilities and advantages in a test environment. Join us to build strong cybersecurity for your organization.   

Agenda

Vulnerability management with Fortra VM

– How to organize a productive center for capturing, monitoring, processing, and fixing vulnerabilities 
– Multi-stage complex scans using Vulnerability Management, Web App Scanning, and Pentest Tool modules   
– How to improve visualization and develop the success of the vulnerability detection department: an interactive network map  
– Continuous pentest within the company. Integration of Core Impact pentest tool with Vulnerability Management  
– The difference between an automated express test and a complete manual penetration test. Why do you need certified exploits?  
– Cobalt Strike and Outflank — heavy weapons for Red Team specialists   

Demonstration in a test environment

– Scanning as the first step on the way to a successful operation   
– Interface and visualization of the vulnerability lifecycle   
– The management console for pen testers of any level of training   
– Core Impact VM integration and exploitation — automated tests without administrators  
– Web scanning and continued attack on the web application. Testing of mobile devices and Wi-Fi networks.  
– Integration and consolidation of all offensive security tools in one place: Fortra VM, Core Impact, Cobalt Strike, Metasploit, Burp Suite, Nmap, Wireshark, Powershell Empire, Cloud Cypher, and more.  

What you get with Fortra

Continuous monitoring and assessment of vulnerabilities

Risk prioritization

Process automation

Compliance with safety standards

Integration with existing systems

Speaker

Yevhen Kurash

Sales Engineer, BAKOTECH

To start

Days
Hours
Minutes
Seconds

Registration

Prior registration for the event is required