From the course: Protecting Your Network with Open Source Software
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
What is a network vulnerability assessment?
From the course: Protecting Your Network with Open Source Software
What is a network vulnerability assessment?
- Network vulnerability assessment is a way to discover potential security weaknesses in a computer network. There are different types of network vulnerabilities. One is vulnerable configurations, such as open ports. Another type is known software vulnerabilities for both operating systems and applications. The third type is vulnerabilities associated with compliance to policies and standards. This one is more human factor oriented rather than technical. For more technical vulnerabilities, especially those related to security misconfigurations, please check out this national vulnerability database by NIST, or National Institute of Standards and Technology. A lot of vulnerability assessment tools use the common configuration enumeration, or CCE, provided by NIST. The process of removing security vulnerabilities as much as possible is referred to as system or network hardening. The hardening can be done technically by…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
(Locked)
What is an IDS?3m 21s
-
(Locked)
Introducing Snort3m
-
(Locked)
Snort as a packet sniffer4m 19s
-
(Locked)
Snort as an IDS: Establishing rules5m 1s
-
(Locked)
Snort as an IDS: Detecting pings2m 10s
-
(Locked)
What is a network vulnerability assessment?3m 22s
-
(Locked)
Nessus2m 37s
-
(Locked)
Network scanning with Nessus2m 30s
-
(Locked)
-
-