From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Outsourcing vulnerability analysis
From the course: Ethical Hacking: Vulnerability Analysis
Outsourcing vulnerability analysis
- [Instructor] Assessing vulnerabilities is very important, as it's part of an overall security plan. And it's generally the first step in decreasing overall organizational risk. In some cases, there are regulations that require vulnerability assessments. Even if they're not required, there are several benefits. Constantly monitoring and scanning for vulnerabilities can provide the confidence that the IT staff has done their due diligence in protecting the infrastructure. When dealing with vulnerability analysis, it can be overwhelming to the security team. One reason is that they might not feel comfortable with the rigors of regularly running the scans and they might be hesitant to deal with the downtime for the IT department, while they're completing the tests. One option is to outsource vulnerability analysis. This is where a security service takes the burden of overseeing the scans, as well as providing additional…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.