Vulnerabilities, Systems Scanning and Exploitation
Cybersecurity | Beginner
- 11 videos | 49m 17s
- Includes Assessment
- Earns a Badge
Vulnerabilities can be defined as a flaw or weakness that can be exploited. One method to identify vulnerabilities is to use a scanner to assess computers, networks, and applications for known weaknesses. By using a scanner, attackers can learn how to best exploit a target system. In this course, you will learn how port scanning works and recognize common ports with known protocols. Discover how to perform network discovery using Nmap, as well as how to perform vulnerability scanning using Nessus. Discover how to exploit a target system using Nessus and Metasploit, and explore how to take over a remote system. Lastly, you'll also explore vulnerability and system scanning countermeasures, and explore countermeasure techniques used to protect against system exploitation. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
provide an overview of vulnerabilities and their potential causesdescribe how port scanning works and recognize common ports with known protocolsrecognize situations in which to use port scannersdemonstrate how to perform network discovery using Nmaprecognize the purpose, the different types, and the risks of vulnerability scannersperform vulnerability scanning using Nessus
explore details of reports produced in Nessusprovide an overview of vulnerability and system scanning countermeasuresrecognize how to take over a remote systemattempt to exploit a target system using Nessus and MetasploitList countermeasure techniques to protect against system exploitation
IN THIS COURSE
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE
Course Systems Hardening