CompTIA PenTest+: Vulnerability Scanning

CompTIA    |    Intermediate
  • 14 videos | 1h 30m 9s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 65 users Rating 4.6 of 65 users (65)
Vulnerability scanning is a process used to assess systems for known weaknesses. In this course, you'll learn how to configure vulnerability scanner settings and scan targets for vulnerabilities. You'll explore the different types of scanning methods, as well as vulnerability testing tools and common scanning themes. Next, you'll learn how to perform a scan analysis. You'll also examine the Nmap utility, which is designed to discover hosts and services on a computer network. You'll move on to explore Nmap Scripting Engine scripts and the numerous switches included in the Nmap utility that can helpful in penetration testing. Lastly, you'll learn about vulnerability testing tools that can help facilitate automation. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize key considerations when performing vulnerability scanning
    Describe best practices for scanning targets for vulnerabilities
    Recognize how to configure scan settings to avoid detection
    Differentiate between types of scans
    List nmap commands that can be used in penetration testing
    List vulnerability testing tools that help facilitate automation
  • Scan applications and containers
    Categorize assets for scans
    Describe adjudication and prioritization of scans
    Define common scanning themes
    Perform a vulnerability scan
    Analyze a vulnerability scan
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 15s
  • 9m 58s
  • Locked
    3.  Scanning Targets for Vulnerabilities
    10m 17s
  • Locked
    4.  Scan Settings and Common Configurations
    6m 10s
  • Locked
    5.  Scanning Methods and Best Practices
    5m 37s
  • Locked
    6.  Nmap Commands for Penetration Testing
    8m 43s
  • Locked
    7.  Vulnerability Testing Tools
    7m 18s
  • Locked
    8.  Application and Container Scanning
    6m 8s
  • Locked
    9.  Asset Categorization
    6m 18s
  • Locked
    10.  Adjudication and Prioritization
    5m 13s
  • Locked
    11.  Common Scanning Themes
    5m 31s
  • Locked
    12.  Performing Vulnerability Scans
    8m 22s
  • Locked
    13.  Performing Scan Analysis
    8m 33s
  • Locked
    14.  Course Summary
    46s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 14 users Rating 4.7 of 14 users (14)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 44 users Rating 4.6 of 44 users (44)
Rating 4.8 of 52 users Rating 4.8 of 52 users (52)
Rating 4.8 of 27 users Rating 4.8 of 27 users (27)