One of the critical things for anyone who wants to learn either how to defend or even attack a network, is the ability to find and analyze system or network vulnerabilities. In this course, Conducting Network Vulnerability Analysis, you will learn to how to follow a systematic process and use this to process and identify potential vulnerabilities. First, you will learn both passive and active vulnerability scanning methods. Next, you will learn to take the results of this data and analyze it to determine the vulnerabilities that can be used to attack, or identify the risk that needs to be mitigated. Finally, you will learn how to deploy three of the most popular vulnerability scanners and conduct comparisons of them. When you are finished with this course, you'll have the knowledge and skills needed to identify vulnerabilities and act appropriately.
Kevin Cardwell provides consulting services for companies throughout the world and is an adviser to numerous government entities across the globe. He is an instructor, technical editor, and author for computer forensics and hacking courses. He is author of Building Virtual Pentesting Labs for Advanced Penetration Testing, first and second edition.
Course Overview Hi everyone, my name is Kevin Cardwell, and welcome to my course, Conducting Network Vulnerability Analysis. I am a freelance and independent consultant, and do penetration testing across the world for a variety of clients. This course is developed to teach you a foundation for vulnerability analysis. This is critical as the cybersecurity threat continues to expand. The ability to identify vulnerabilities and their risk is a tangible and valuable industry skill for you to have. Some of the major topics that we will cover include: preparing your toolkit, the hacking mindset, harvesting data using internet resources, executing vulnerability scans, and comparison of three popular scanning tools. By the end of this course, you will have established a foundation for conducting vulnerability analysis. Before beginning the course, you should be familiar with networking, IP addresses, and virtualization. From here, you should feel comfortable diving into cybersecurity and hacking with courses on ethical hacking, penetration testing, and IT security. I hope you'll join me on this journey to learn the foundation of vulnerability analysis with the Conducting Network Vulnerability Analysis course, at Pluralsight.