CEH v11: Vulnerability Assessment Types, Models, Tools & Reports
Ethical Hacker v11
- 3 Videos | 56m 11s
- Includes Assessment
- Earns a Badge
Performing a vulnerability assessment allows you to locate potential weaknesses in systems, networks, and channels of communication. This is a vital step in defending systems against attacks. In this course, you'll learn about the different types of vulnerability assessments. You'll move on to explore various vulnerability assessment models and tools. Finally, you examine important information that should be included in your vulnerability assessment reports. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
-
identify the type of vulnerability assessment that involves probing a system for vulnerabilitiesrecognize the type of security controls that should be used when accessing datarecognize the type of vulnerability assessment that involves using a sniffer to identify sensitive trafficidentify common vulnerability scanners and toolsidentify the vulnerability assessment model that involves you running a vulnerability scanner
-
recognize the different vulnerability assessment modelsidentify high level severity items in a vulnerability reportrecognize how to add a list of targets to a vulnerability scannerrecognize the elements of a vulnerability report
IN THIS COURSE
-
1.Vulnerability Assessment Types19m 28s
-
2.Vulnerability Assessment Models and Tools17m 55s
-
3.Vulnerability Assessment Reports18m 49s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.