Ethical Hacking: Vulnerability Analysis

Ethical Hacking: Vulnerability Analysis
Ethical Hacking: Vulnerability Analysis
English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 09m | 205 MB

In order to assess—and ultimately, decrease—an organization’s risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you’re working to strengthen network security at your organization, it’s essential to have a solid grasp of the processes, methodologies, and tools needed to assess vulnerabilities. In this course, security expert Lisa Bock takes a deep dive into the topic of vulnerability scanning, covering what you need to know to find and address weaknesses that attackers might exploit. Lisa goes over the basics of managing organizational risk, discusses vulnerability analysis methodologies, and shows how to work with vulnerability assessment tools, including Nikto and OpenVAS. Plus, she shares tools and strategies for defending the LAN.

Topics include:

  • Common causes of vulnerabilities
  • Identifying and assessing vulnerabilities
  • The Common Vulnerability Scoring System (CVSS)
  • Outsourcing vulnerability analysis
  • Leveraging Nikto and other vulnerability assessment tools
  • Securing mobile devices
  • Defending the LAN
Table of Contents

Introduction
1 Managing risk
2 What you need to know
3 Hacking ethically Disclaimer

Managing Organizational Risk
4 Risks threats and vulnerabilities
5 Common causes of vulnerabilities
6 Assessing vulnerabilities
7 Vulnerability management life cycle

Vulnerability Analysis
8 Common Vulnerability Scoring System
9 Common vulnerabilities and exposures
10 Outsourcing vulnerability analysis
11 Bug bounty white hat hacking

Vulnerability Assessment Tools
12 Kali Linux VM
13 Assessment tools
14 Nikto demo
15 Securing mobile devices
16 Fuzz testing

Defend the LAN
17 LAN vulnerability scanners
18 Updates and patches
19 Firewalls and HIDS
20 Vulnerability assessment reports

Conclusion
21 Next steps