CompTIA PenTest+: Vulnerability Identification
Intermediate
- 9 Videos | 40m 42s
- Includes Assessment
- Earns a Badge
Discover how to properly perform and analyze vulnerability scans, in preparation for the PT0-001: CompTIA PenTest+ certification exam. During this course you will learn about scan types, their considerations, applications, and containers, such as the Docker software platform. Discover how to categorize assets for scans and how to adjudicate and prioritize scans. Review common scanning themes, such as the definition of vulnerability. See how to perform a vulnerability scan and analyze its results. As an exercise, you will list eight common examples of compliance scans, name three benefits of credentialed scans, and list three considerations about vulnerability scans.
WHAT YOU WILL LEARN
-
compare different types of scansdefine scanning considerationsscan applications and containerscategorize assets for scansdescribe adjudication and prioritization of scans
-
define common scanning themesperform a vulnerability scananalyze a vulnerability scandescribe vulnerability scanning
IN THIS COURSE
-
1.Types of Scans7m 35sUP NEXT
-
2.Considerations of Vulnerability Scanning3m 30s
-
3.Application and Container Scanning2m 38s
-
4.Asset Categorization4m 55s
-
5.Adjudication and Prioritization3m 28s
-
6.Common Scanning Themes3m 50s
-
7.Performing Vulnerability Scans6m 36s
-
8.Performing Scan Analysis5m 39s
-
9.Exercise: Vulnerability Scanning2m 30s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.