Vulnerabilities, Systems Scanning and Exploitation
Cybersecurity
| Beginner
- 11 Videos | 49m 17s
- Includes Assessment
- Earns a Badge
Vulnerabilities can be defined as a flaw or weakness that can be exploited. One method to identify vulnerabilities is to use a scanner to assess computers, networks, and applications for known weaknesses. By using a scanner, attackers can learn how to best exploit a target system. In this course, you will learn how port scanning works and recognize common ports with known protocols. Discover how to perform network discovery using Nmap, as well as how to perform vulnerability scanning using Nessus. Discover how to exploit a target system using Nessus and Metasploit, and explore how to take over a remote system. Lastly, you'll also explore vulnerability and system scanning countermeasures, and explore countermeasure techniques used to protect against system exploitation. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
provide an overview of vulnerabilities and their potential causesdescribe how port scanning works and recognize common ports with known protocolsrecognize situations in which to use port scannersdemonstrate how to perform network discovery using Nmaprecognize the purpose, the different types, and the risks of vulnerability scannersperform vulnerability scanning using Nessus
-
explore details of reports produced in Nessusprovide an overview of vulnerability and system scanning countermeasuresrecognize how to take over a remote systemattempt to exploit a target system using Nessus and MetasploitList countermeasure techniques to protect against system exploitation
IN THIS COURSE
-
1.Vulnerability Weaknesses and Flaws1m 28sUP NEXT
-
2.Port Scanning Techniques8m 5s
-
3.Port Scanner Capabilities1m 19s
-
4.Performing Network Discovery Nmap7m 13s
-
5.Vulnerability scanners4m 44s
-
6.Using Nessus for Vulnerability Scanning3m 2s
-
7.Reporting in Nessus2m 48s
-
8.Vulnerability and Systems Scanning Countermeasures7m 46s
-
9.Remote System Exploitation3m 52s
-
10.Nessus and Metasploit4m 32s
-
11.System Exploitation and Countermeasures4m 28s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.