From the course: Ethical Hacking: Vulnerability Analysis

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Next steps

Next steps

- [Lisa] Thank you for watching. In this course I covered the importance of managing organizational risk. I reviewed the vulnerability analysis process and lifecyle. And then we took a look at the way vulnerabilities are accessed, scored, and shared into the National Vulnerability Database, and how vendors utilize this. We also took a look at the best way to outsource vulnerability analysis and then we looked at the different assessment tools, such as Nikto, OpenVAS, and the importance of scanning your mobile devices. Finally, we examined various ways to defend the LAN, staying compliance, and reviewed key components of a vulnerability assessment report and ways to communicate the results. Hopefully you have a better understanding of vulnerability analysis, so that you can mitigate the vulnerabilities and reduce overall risk to your organization. If you're interested in learning more please check out the IT and…

Contents