Loading Events
This event has passed.

Within a virtual environment, participants will walk through the steps that an attacker would
use to exploit the bash bug vulnerability, using popular assessment tools including Burpsuite.
Afterwards, participants will remediate vulnerabilities and verify that the attack is no longer
possible.

View the Event Flyer
Register for this event
Go to Top