Conducting Network Vulnerability Analysis

This course will teach you how to find vulnerabilities in systems and software by teaching the process that a hacker uses when they target an organization.
Course info
Level
Intermediate
Updated
January 11, 2017
Duration
2h 28m
Table of contents
Course Concepts
10m 53s
Conclusion
4m 24s
Description
Course info
Level
Intermediate
Updated
January 11, 2017
Duration
2h 28m
Description

One of the critical things for anyone who wants to learn either how to defend or even attack a network, is the ability to find and analyze system or network vulnerabilities. In this course, Conducting Network Vulnerability Analysis, you will learn to how to follow a systematic process and use this to process and identify potential vulnerabilities. First, you will learn both passive and active vulnerability scanning methods. Next, you will learn to take the results of this data and analyze it to determine the vulnerabilities that can be used to attack, or identify the risk that needs to be mitigated. Finally, you will learn how to deploy three of the most popular vulnerability scanners and conduct comparisons of them. When you are finished with this course, you'll have the knowledge and skills needed to identify vulnerabilities and act appropriately.

About the author
About the author

Kevin Cardwell provides consulting services for companies throughout the world and is an adviser to numerous government entities across the globe. He is an instructor, technical editor, and author for computer forensics and hacking courses. He is author of Building Virtual Pentesting Labs for Advanced Penetration Testing, first and second edition.