Ethical Hacking: Vulnerability Analysis

Pluralsight is not an official partner or accredited training center of EC-Council. In this course, you'll learn how important it is to not only scan your networks for any red flags but also how to analyse those results.
Course info
Rating
(22)
Level
Intermediate
Updated
Sep 28, 2018
Duration
3h 14m
Table of contents
What Do You Need to Start?
Shaping and Implementing Our Vulnerability Scans
The Scanners
Analyzing Vulnerability Scans
Remediation and Change Control
Remediating Host Vulnerabilities
Remediating Network Vulnerabilities
Remediating Virtual Environment Vulnerabilities
Description
Course info
Rating
(22)
Level
Intermediate
Updated
Sep 28, 2018
Duration
3h 14m
Description

Pluralsight is not an official partner or accredited training center of EC-Council. Networks aren’t what they use to be. They’re more complex than ever. Systems today are so interconnected, and buried within those systems are thousands of undetected security vulnerabilities waiting to be used against you. Attackers perform vulnerability analysis to identify loopholes in your organization's infrastructure. Any vulnerabilities they find will be used to breach and dig deeper into your systems. In this course, Ethical Hacking: Vulnerability Analysis, you'll learn how to further secure your infrastructures by using the same tools and techniques that attackers use to probe your network to find possible attack vectors. First, you'll be taught about the different types of vulnerabilities, the types of scans and possible regulatory requirements that you might face. Next, you'll learn about the different VMS (Vulnerability Management Software) programs and how to choose one that is best for your organization. Finally, you learn how to prioritize your vulnerabilities and the remediation steps needed for servers, a workstation, networks, or even virtual machines. When you've finished this course, you'll have under your "Utility-Belt," the skills and knowledge of an Ethical Hacker when it comes to vulnerability analysis.

About the author
About the author

Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.

More from the author
Results and Reporting for CompTIA PenTest+
Intermediate
1h 16m
Jun 26, 2020
Post-Exploit Tasks for CompTIA PenTest+
Intermediate
1h 17m
Jun 5, 2020
Testing Applications for CompTIA PenTest+
Intermediate
1h 13m
Apr 23, 2020
More courses by Dale Meredith