{"id":296,"date":"2018-09-21T10:08:13","date_gmt":"2018-09-21T08:08:13","guid":{"rendered":"https:\/\/trustintech.eu\/?p=296"},"modified":"2018-09-21T10:08:13","modified_gmt":"2018-09-21T08:08:13","slug":"trust-in-tech-september-kali-workshop","status":"publish","type":"post","link":"https:\/\/trustintech.eu\/index.php\/2018\/09\/21\/trust-in-tech-september-kali-workshop\/","title":{"rendered":"Trust in Tech &#8211; September Kali Workshop"},"content":{"rendered":"<h2>Dear White-Hats,<\/h2>\n<p>what an amazing experience we had with Kali Linux. Thanks to everyone who participated, we now have a overview of how cyber attacks work. We got to know Kali Linux as the main tool for Hackers. Our Speakers gave you a guided tour of a cyber attack along the Cyber Security Kill Chain. Thank you so much!<\/p>\n<p>&nbsp;<\/p>\n<p><img class=\"aligncenter\" src=\"http:\/\/trustintech.eu\/wp-content\/uploads\/2018\/08\/CKC.png\" \/><\/p>\n<p>&nbsp;<\/p>\n<p dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Before it goes into the well-deserved time-out, here&#8217;s again our small call for action: Take our spirit into the world and tell your friends and colleagues about it. Maybe you even feel like acting as a speaker or know someone who wants to introduce us to his topics. Are there any topics that matter to you? Let us have your wishes.<\/p>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-ta tw-text-medium\" dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\"><span lang=\"en\">See you next time and all the best!<\/span><\/p>\n<p dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-217\" src=\"http:\/\/trustintech.eu\/wp-content\/uploads\/2018\/03\/meetup_logo-300x111.png\" alt=\"\" width=\"300\" height=\"111\" srcset=\"https:\/\/trustintech.eu\/wp-content\/uploads\/2018\/03\/meetup_logo-300x111.png 300w, https:\/\/trustintech.eu\/wp-content\/uploads\/2018\/03\/meetup_logo-768x284.png 768w, https:\/\/trustintech.eu\/wp-content\/uploads\/2018\/03\/meetup_logo.png 1020w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dear White-Hats, what an amazing experience we had with Kali Linux. Thanks to everyone who participated, we now have a overview of how cyber attacks work. We got to know Kali Linux as the main tool for Hackers. Our Speakers gave you a guided tour of a cyber attack along the Cyber Security Kill Chain.&#160;[&#8230;] <\/p>\n<p><a href=\"https:\/\/trustintech.eu\/index.php\/2018\/09\/21\/trust-in-tech-september-kali-workshop\/\" title=\"\" class=\"more-link\">Weiterlesen&#160;&#8230;<\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"_links":{"self":[{"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":1,"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/posts\/296\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustintech.eu\/index.php\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}