Facebook Google Plus Twitter LinkedIn YouTube RSS 메뉴 검색 리소스 - 블로그리소스 - 웨비나리소스 - 보고서리소스 - 이벤트icons_066 icons_067icons_068icons_069icons_070
Back to webinars
주문형 웨비나

Active Directory 방어를 컨트롤하려면 공격자처럼 생각하라

On-Demand

How to identify, prioritize and prevent exploitation of Active Directory attack paths.

Attackers are really good at identifying and leveraging Active Directory attack paths to comprise your networks. In this on-demand webinar, we’ll flip the script and give you the insights needed to understand how attackers operate, so you can more effectively secure Active Directory and protect your business.

Led by Tenable’s Senior Director and Customer Evangelist, and 17X Microsoft MVP, Derek Melber; by watching you will learn:

  • How attackers identify attack paths
  • Effective measures for assessing attack path “blast radius” and negating exploitation
  • Ways you can leverage attack path concepts

누가 참석해야 합니까?
IT and cybersecurity professionals responsible for preventing cyber criminals from finding and exploiting Active Directory attack paths.

지금 등록하고 주문형 웨비나를 시청하십시오.


발표자

Photo of Derek Melber, 17X Microsoft MVP and Senior Director, Customer Evangelist, Tenable
Derek Melber

Senior Director, Customer Evangelist, Tenable

지금 주문형 웨비나를 시청하십시오.

× 영업 팀에게 문의