YoVDO

Ethical Hacking: Vulnerability Analysis

Offered By: Pluralsight

Tags

Ethical Hacking Courses Cybersecurity Courses Network Administration Courses Vulnerability Analysis Courses

Course Description

Overview

Pluralsight is not an official partner or accredited training center of EC-Council. In this course, you'll learn how important it is to not only scan your networks for any red flags but also how to analyse those results.

Pluralsight is not an official partner or accredited training center of EC-Council. Networks aren’t what they use to be. They’re more complex than ever. Systems today are so interconnected, and buried within those systems are thousands of undetected security vulnerabilities waiting to be used against you. Attackers perform vulnerability analysis to identify loopholes in your organization's infrastructure. Any vulnerabilities they find will be used to breach and dig deeper into your systems. In this course, Ethical Hacking: Vulnerability Analysis, you'll learn how to further secure your infrastructures by using the same tools and techniques that attackers use to probe your network to find possible attack vectors. First, you'll be taught about the different types of vulnerabilities, the types of scans and possible regulatory requirements that you might face. Next, you'll learn about the different VMS (Vulnerability Management Software) programs and how to choose one that is best for your organization. Finally, you learn how to prioritize your vulnerabilities and the remediation steps needed for servers, a workstation, networks, or even virtual machines. When you've finished this course, you'll have under your "Utility-Belt," the skills and knowledge of an Ethical Hacker when it comes to vulnerability analysis.

Topics:
  • What Do You Need to Start?
  • Shaping and Implementing Our Vulnerability Scans
  • The Scanners
  • Analyzing Vulnerability Scans
  • Remediation and Change Control
  • Remediating Host Vulnerabilities
  • Remediating Network Vulnerabilities
  • Remediating Virtual Environment Vulnerabilities

Taught by

Dale Meredith

Related Courses

Information Security-3
Indian Institute of Technology Madras via Swayam
Сетевое администрирование: от теории к практике
Tsinghua University via Coursera
CompTIA Network+ N10-007 500+ Questions + Subnetting Review
Udemy
Linux Administration & Linux Command Line For Beginners
Udemy
The Complete Wireshark Course: Go from Beginner to Advanced!
Udemy