CEH v11: Vulnerability Assessment Types, Models, Tools & Reports

Ethical Hacker v11    |    Intermediate
  • 3 videos | 56m 11s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 25 users Rating 4.6 of 25 users (25)
Performing a vulnerability assessment allows you to locate potential weaknesses in systems, networks, and channels of communication. This is a vital step in defending systems against attacks. In this course, you'll learn about the different types of vulnerability assessments. You'll move on to explore various vulnerability assessment models and tools. Finally, you examine important information that should be included in your vulnerability assessment reports. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize the type of vulnerability assessment that involves using a sniffer to identify sensitive traffic
    identify the type of vulnerability assessment that involves probing a system for vulnerabilities
    recognize the type of security controls that should be used when accessing data
    Identify the vulnerability assessment model that involves you running a vulnerability scanner
    identify common vulnerability scanners and tools
  • recognize the different vulnerability assessment models
    Recognize how to add a list of targets to a vulnerability scanner
    identify high level severity items in a vulnerability report
    recognize the elements of a vulnerability report

IN THIS COURSE

  • Locked
    1.  Vulnerability Assessment Types
    19m 28s
    After completing this video, you will be able to recognize the type of security controls that should be used when accessing data. FREE ACCESS
  • Locked
    2.  Vulnerability Assessment Models and Tools
    17m 55s
    Upon completion of this video, you will be able to recognize the different vulnerability assessment models. FREE ACCESS
  • Locked
    3.  Vulnerability Assessment Reports
    18m 49s
    Upon completion of this video, you will be able to add a list of targets to a vulnerability scanner. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 23 users Rating 4.5 of 23 users (23)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.7 of 20 users Rating 4.7 of 20 users (20)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 196 users Rating 4.6 of 196 users (196)
Rating 4.8 of 41 users Rating 4.8 of 41 users (41)
Rating 4.6 of 35 users Rating 4.6 of 35 users (35)