CEH v11: Vulnerability Assessment, Management, & Classification
Ethical Hacker v11 | Intermediate
- 3 Videos | 51m 43s
- Includes Assessment
- Earns a Badge
One of the main job duties of many ethical hackers is performing vulnerability assessments. In this course, you'll explore the basic concepts of vulnerability assessments, as well as tools and resources commonly used when performing one. You'll examine the vulnerability management life cycle and common activities performed during it. Finally, you'll learn about the various vulnerability types you may discover during an assessment. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
describe the rating and score metrics used by the Common Vulnerability and Exposures (CVE) scoring systemrecognize tools and resources commonly used when analyzing a vulnerability assessment reportdescribe the six activities of the vulnerability management life cycledescribe the vulnerability phases in relation to the vulnerability assessment life cycle
recognize the activities performed during the assessment phasesidentify the type of vulnerability that could be discovered during an assessmentmatch the different vulnerability types that could be found during an assessmentrecognize the different vulnerability types and how they may be identified during an assessment
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.