CompTIA PenTest+: Vulnerability Identification

Intermediate
  • 9 videos | 40m 42s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 20 users Rating 4.7 of 20 users (20)
Discover how to properly perform and analyze vulnerability scans, in preparation for the PT0-001: CompTIA PenTest+ certification exam. During this course you will learn about scan types, their considerations, applications, and containers, such as the Docker software platform. Discover how to categorize assets for scans and how to adjudicate and prioritize scans. Review common scanning themes, such as the definition of vulnerability. See how to perform a vulnerability scan and analyze its results. As an exercise, you will list eight common examples of compliance scans, name three benefits of credentialed scans, and list three considerations about vulnerability scans.

WHAT YOU WILL LEARN

  • Compare different types of scans
    Define scanning considerations
    Scan applications and containers
    Categorize assets for scans
    Describe adjudication and prioritization of scans
  • Define common scanning themes
    Perform a vulnerability scan
    Analyze a vulnerability scan
    Describe vulnerability scanning

IN THIS COURSE

  • 7m 35s
    Learn how to compare different types of scans. FREE ACCESS
  • 3m 30s
    In this video, you will learn about scanning considerations. FREE ACCESS
  • Locked
    3.  Application and Container Scanning
    2m 38s
    In this video, find out how to scan for applications and containers. FREE ACCESS
  • Locked
    4.  Asset Categorization
    4m 55s
    In this video, you will learn how to categorize assets for scans. FREE ACCESS
  • Locked
    5.  Adjudication and Prioritization
    3m 28s
    Upon completion of this video, you will be able to describe adjudication and prioritization of scans. FREE ACCESS
  • Locked
    6.  Common Scanning Themes
    3m 50s
    In this video, you will learn about common scanning themes. FREE ACCESS
  • Locked
    7.  Performing Vulnerability Scans
    6m 36s
    In this video, you will learn how to perform a vulnerability scan. FREE ACCESS
  • Locked
    8.  Performing Scan Analysis
    5m 39s
    In this video, you will learn how to analyze a vulnerability scan. FREE ACCESS
  • Locked
    9.  Exercise: Vulnerability Scanning
    2m 30s
    Upon completion of this video, you will be able to describe vulnerability scanning. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 65 users Rating 4.6 of 65 users (65)
Rating 4.7 of 3 users Rating 4.7 of 3 users (3)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 187 users Rating 4.6 of 187 users (187)
Rating 4.6 of 23 users Rating 4.6 of 23 users (23)
Rating 4.6 of 19 users Rating 4.6 of 19 users (19)