CompTIA PenTest+: Vulnerability Identification
Intermediate
- 9 videos | 40m 42s
- Includes Assessment
- Earns a Badge
Discover how to properly perform and analyze vulnerability scans, in preparation for the PT0-001: CompTIA PenTest+ certification exam. During this course you will learn about scan types, their considerations, applications, and containers, such as the Docker software platform. Discover how to categorize assets for scans and how to adjudicate and prioritize scans. Review common scanning themes, such as the definition of vulnerability. See how to perform a vulnerability scan and analyze its results. As an exercise, you will list eight common examples of compliance scans, name three benefits of credentialed scans, and list three considerations about vulnerability scans.
WHAT YOU WILL LEARN
-
compare different types of scansdefine scanning considerationsscan applications and containerscategorize assets for scansdescribe adjudication and prioritization of scans
-
define common scanning themesperform a vulnerability scananalyze a vulnerability scandescribe vulnerability scanning
IN THIS COURSE
-
7m 35s
-
3m 30s
-
2m 38s
-
4m 55s
-
3m 28s
-
3m 50s
-
6m 36s
-
5m 39s
-
2m 30s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.