Vulnerabilities, Systems Scanning and Exploitation

Cybersecurity    |    Beginner
  • 11 videos | 49m 17s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 106 users Rating 4.4 of 106 users (106)
Vulnerabilities can be defined as a flaw or weakness that can be exploited. One method to identify vulnerabilities is to use a scanner to assess computers, networks, and applications for known weaknesses. By using a scanner, attackers can learn how to best exploit a target system. In this course, you will learn how port scanning works and recognize common ports with known protocols. Discover how to perform network discovery using Nmap, as well as how to perform vulnerability scanning using Nessus. Discover how to exploit a target system using Nessus and Metasploit, and explore how to take over a remote system. Lastly, you'll also explore vulnerability and system scanning countermeasures, and explore countermeasure techniques used to protect against system exploitation. This course was originally created by Global Knowledge (GK).

WHAT YOU WILL LEARN

  • Provide an overview of vulnerabilities and their potential causes
    Describe how port scanning works and recognize common ports with known protocols
    Recognize situations in which to use port scanners
    Demonstrate how to perform network discovery using nmap
    Recognize the purpose, the different types, and the risks of vulnerability scanners
    Perform vulnerability scanning using nessus
  • Explore details of reports produced in nessus
    Provide an overview of vulnerability and system scanning countermeasures
    Recognize how to take over a remote system
    Attempt to exploit a target system using nessus and metasploit
    List countermeasure techniques to protect against system exploitation

IN THIS COURSE

  • 1m 28s
  • 8m 5s
  • Locked
    3.  Port Scanner Capabilities
    1m 19s
  • Locked
    4.  Performing Network Discovery Nmap
    7m 13s
  • Locked
    5.  Vulnerability scanners
    4m 44s
  • Locked
    6.  Using Nessus for Vulnerability Scanning
    3m 2s
  • Locked
    7.  Reporting in Nessus
    2m 48s
  • Locked
    8.  Vulnerability and Systems Scanning Countermeasures
    7m 46s
  • Locked
    9.  Remote System Exploitation
    3m 52s
  • Locked
    10.  Nessus and Metasploit
    4m 32s
  • Locked
    11.  System Exploitation and Countermeasures
    4m 28s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 116 users Rating 4.4 of 116 users (116)
Rating 4.6 of 215 users Rating 4.6 of 215 users (215)
Rating 4.6 of 1361 users Rating 4.6 of 1361 users (1361)