Ethical Hacking: Vulnerability Analysis
Offered By: LinkedIn Learning
Course Description
Overview
Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
Syllabus
Introduction
- Managing risk
- Discovering resources
- Hacking ethically: Disclaimer
- Risks threats and vulnerabilities
- Recognizing common vulnerabilities
- Classifying vulnerabilities
- Assessing vulnerabilities
- Vulnerability management life cycle
- Modeling threats
- Challenge: Threat modeling exercise
- Solution: Threat modeling exercise
- Common Vulnerability Scoring System
- Common vulnerabilities and exposures
- Outsourcing vulnerability analysis
- Bug bounty white hat hacking
- Challenge: The Temporal metric group
- Solution: The Temporal metric group
- Installing Kali Linux
- Assessment tools
- Nikto demo
- Securing mobile devices
- Fuzz testing
- LAN vulnerability scanners
- Scanning the LAN
- Selecting a vulnerability assessment tool
- Updates and patches
- Firewalls and HIDS
- Vulnerability assessment reports
- Next steps
Taught by
Lisa Bock
Related Courses
Unlocking Information Security II: An Internet PerspectiveTel Aviv University via edX Ciberseguridad. Bases y estructuras para la protección de la información
Universidad Anáhuac via edX Disaster, Crisis, and Emergency Preparedness Communication
State University of New York via Coursera Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera Become an Ethical Hacker
LinkedIn Learning