From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Assessing vulnerabilities
From the course: Ethical Hacking: Vulnerability Analysis
Assessing vulnerabilities
- [Instructor] Assessing vulnerabilities is the first step in decreasing overall organizational risk, and involves various tools and techniques. In this segment, we'll compare the different types of scans along with what type to use according to the objectives of the scan. First, let's talk about what we are evaluating when assessing vulnerabilities. An enterprise network is complicated and can be thought of in two separate areas. Information systems and information technology. Information systems is the software side, this ensures data availability and it drives business processes and decision making. It includes database management, management information, and decision support systems. Information technology commonly refers to the hardware side, including all computers and networking devices within. Both sides work together in an organization, and both should be assessed for vulnerabilities. Next, let's talk about what it means to conduct a vulnerability assessment exercise. First…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Risks threats and vulnerabilities4m 16s
-
(Locked)
Recognizing common vulnerabilities5m 41s
-
(Locked)
Classifying vulnerabilities5m 3s
-
(Locked)
Assessing vulnerabilities5m 41s
-
(Locked)
Vulnerability management life cycle4m 44s
-
(Locked)
Modeling threats4m 8s
-
(Locked)
Challenge: Threat modeling exercise2m 40s
-
(Locked)
Solution: Threat modeling exercise2m 22s
-
-
-
-
-