CompTIA PenTest+: Vulnerability Identification

Intermediate
  • 9 videos | 40m 42s
  • Includes Assessment
  • Earns a Badge
Likes 52 Likes 52
Discover how to properly perform and analyze vulnerability scans, in preparation for the PT0-001: CompTIA PenTest+ certification exam. During this course you will learn about scan types, their considerations, applications, and containers, such as the Docker software platform. Discover how to categorize assets for scans and how to adjudicate and prioritize scans. Review common scanning themes, such as the definition of vulnerability. See how to perform a vulnerability scan and analyze its results. As an exercise, you will list eight common examples of compliance scans, name three benefits of credentialed scans, and list three considerations about vulnerability scans.

WHAT YOU WILL LEARN

  • compare different types of scans
    define scanning considerations
    scan applications and containers
    categorize assets for scans
    describe adjudication and prioritization of scans
  • define common scanning themes
    perform a vulnerability scan
    analyze a vulnerability scan
    describe vulnerability scanning

IN THIS COURSE

  • 7m 35s
  • 3m 30s
  • Locked
    3.  Application and Container Scanning
    2m 38s
  • Locked
    4.  Asset Categorization
    4m 55s
  • Locked
    5.  Adjudication and Prioritization
    3m 28s
  • Locked
    6.  Common Scanning Themes
    3m 50s
  • Locked
    7.  Performing Vulnerability Scans
    6m 36s
  • Locked
    8.  Performing Scan Analysis
    5m 39s
  • Locked
    9.  Exercise: Vulnerability Scanning
    2m 30s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 46 Likes 46  
Likes 25 Likes 25