Ethical Hacking: Vulnerability Analysis
Offered By: LinkedIn Learning
Course Description
Overview
Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
Syllabus
Introduction
- Managing risk
- Discovering resources
- Hacking ethically: Disclaimer
- Risks threats and vulnerabilities
- Recognizing common vulnerabilities
- Classifying vulnerabilities
- Assessing vulnerabilities
- Vulnerability management life cycle
- Modeling threats
- Challenge: Threat modeling exercise
- Solution: Threat modeling exercise
- Common Vulnerability Scoring System
- Common vulnerabilities and exposures
- Outsourcing vulnerability analysis
- Bug bounty white hat hacking
- Challenge: The Temporal metric group
- Solution: The Temporal metric group
- Installing Kali Linux
- Assessment tools
- Nikto demo
- Securing mobile devices
- Fuzz testing
- LAN vulnerability scanners
- Scanning the LAN
- Selecting a vulnerability assessment tool
- Updates and patches
- Firewalls and HIDS
- Vulnerability assessment reports
- Next steps
Taught by
Lisa Bock
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX