From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 22,500 courses taught by industry experts or purchase this course individually.
Vulnerability management life cycle
From the course: Ethical Hacking: Vulnerability Analysis
Vulnerability management life cycle
- [Instructor] Threats exist, as well as vulnerabilities. You can control the threats, however, you can reduce overall risk by reducing the vulnerabilities. Vulnerability management constantly progresses through a lifecycle that includes baseline, assess vulnerabilities, assess risks, remediate, verify, and monitor. To achieve real value from a vulnerability assessment, begin with an initial study that helps identify the assets and defines the risk and possible business impact. Completing this exercise helps to answer the question, why are we doing this? Because once the organization understands the overall impact of a cyberattack, they'll be more vested in identifying and mitigating vulnerabilities. A baseline is a snapshot of network traffic during a particular window of time. You can take a look at the utilization, the protocols, and latency issues. This baseline should be done over a couple days to learn what normal…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Risks threats and vulnerabilities4m 16s
-
(Locked)
Common causes of vulnerabilities3m 42s
-
(Locked)
Assessing vulnerabilities3m 47s
-
(Locked)
Vulnerability management life cycle4m 44s
-
(Locked)
Modeling threats4m 7s
-
(Locked)
Challenge: Threat modeling exercise1m 9s
-
(Locked)
Solution: Threat modeling exercise2m 17s
-
-
-
-
-