In this Vulnerability Assessment training course, you learn how to create a network security vulnerability assessment checklist by exposing infrastructure, server, and desktop vulnerabilities, create and interpret reports, configure vulnerability scanners, detect points of exposure, and ultimately prevent network exploitation.
To minimise costly security breaches, organisations need to evaluate the risk in their enterprise from an array of vulnerabilities. Attend this 4-day course and learn to minimise your organization's exposure to security breaches.
TRAINING AT YOUR SITE
*Events with the Partial Day Event clock icon run longer than normal but provide the convenience of half-day sessions.
Guaranteed to RunWhen you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time — will run. Guaranteed.
Partial Day EventLearning Tree offers a flexible schedule program. If you cannot attend full day sessions, this option consists of four-hour sessions per day instead of the full-day session.
Scanning and exploits
Uncovering infrastructure vulnerabilities
Attacks against analyzers and IDS
Exposing server vulnerabilities
Revealing desktop vulnerabilities
Implementing scanner operations and configuration
Creating and interpreting reports
Researching alert information
Identifying factors that affect risk
The vulnerability management cycle
The process of defining, identifying, classifying and prioritising what vulnerabilities are in your system.
The purpose of this assessment is to find out what vulnerabilities may be within your system in time to fix them.
A vulnerability assessment scans for known vulnerabilities, while a penetration test tries to actively exploit and fix the weaknesses.
Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.