CEH v11: Vulnerability Assessment, Management & Classification

Ethical Hacker v11    |    Intermediate
  • 3 videos | 51m 43s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 35 users Rating 4.6 of 35 users (35)
One of the main job duties of many ethical hackers is performing vulnerability assessments. In this course, you'll explore the basic concepts of vulnerability assessments, as well as tools and resources commonly used when performing one. You'll examine the vulnerability management life cycle and common activities performed during it. Finally, you'll learn about the various vulnerability types you may discover during an assessment. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Describe the rating and score metrics used by the common vulnerability and exposures (cve) scoring system
    recognize tools and resources commonly used when analyzing a vulnerability assessment report
    Describe the six activities of the vulnerability management life cycle
    describe the vulnerability phases in relation to the vulnerability assessment life cycle
  • recognize the activities performed during the assessment phases
    Identify the type of vulnerability that could be discovered during an assessment
    recognize the different vulnerability types and how they may be identified during an assessment
    match the different vulnerability types that could be found during an assessment

IN THIS COURSE

  • Locked
    1.  Vulnerability Assessment Concepts and Resources
    13m 9s
    Upon completion of this video, you will be able to describe the rating and score metrics used by the Common Vulnerability and Exposures (CVE) scoring system. FREE ACCESS
  • Locked
    2.  Vulnerability Management Life Cycle
    18m 1s
    After completing this video, you will be able to describe the vulnerability phases in relation to the vulnerability assessment life cycle. FREE ACCESS
  • Locked
    3.  Vulnerability Classification
    20m 34s
    Upon completion of this video, you will be able to recognize the different types of vulnerabilities and how they may be identified during an assessment. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 266 users Rating 4.7 of 266 users (266)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.6 of 25 users Rating 4.6 of 25 users (25)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 25 users Rating 4.6 of 25 users (25)
Rating 4.8 of 13 users Rating 4.8 of 13 users (13)
Rating 4.4 of 126 users Rating 4.4 of 126 users (126)