From the course: Ethical Hacking: Vulnerability Analysis

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Assessing vulnerabilities

Assessing vulnerabilities

From the course: Ethical Hacking: Vulnerability Analysis

Start my 1-month free trial

Assessing vulnerabilities

- [Instructor] Assessing vulnerabilities is very important as part of an overall security plan as it's the first step in decreasing overall organizational risk. Assessing vulnerabilities involves various tools, techniques, and methods used to identify and prioritize vulnerabilities within an organization. Network scanning probes targets on the network to detect open ports, determine software, operating systems, and known vulnerabilities. There are many approaches that you can take but it's important to understand that the network is complicated and can be thought of in two separate areas, information systems and information technology. Information systems is the software side. This ensures data availability and it drives business processes and decision-making. It includes database management systems, management information systems, and decision support systems. Information technology generally refers to the hardware…

Contents