From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Assessing vulnerabilities
From the course: Ethical Hacking: Vulnerability Analysis
Assessing vulnerabilities
- [Instructor] Assessing vulnerabilities is very important as part of an overall security plan as it's the first step in decreasing overall organizational risk. Assessing vulnerabilities involves various tools, techniques, and methods used to identify and prioritize vulnerabilities within an organization. Network scanning probes targets on the network to detect open ports, determine software, operating systems, and known vulnerabilities. There are many approaches that you can take but it's important to understand that the network is complicated and can be thought of in two separate areas, information systems and information technology. Information systems is the software side. This ensures data availability and it drives business processes and decision-making. It includes database management systems, management information systems, and decision support systems. Information technology generally refers to the hardware…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Risks threats and vulnerabilities4m 16s
-
(Locked)
Common causes of vulnerabilities3m 42s
-
(Locked)
Assessing vulnerabilities3m 47s
-
(Locked)
Vulnerability management life cycle4m 44s
-
(Locked)
Modeling threats4m 7s
-
(Locked)
Challenge: Threat modeling exercise1m 9s
-
(Locked)
Solution: Threat modeling exercise2m 17s
-
-
-
-
-