In this Vulnerability Assessment training course, you learn how to create a network security vulnerability assessment checklist by exposing infrastructure, server, and desktop vulnerabilities, create and interpret reports, configure vulnerability scanners, detect points of exposure, and ultimately prevent network exploitation.
To minimise costly security breaches, organisations need to evaluate the risk in their enterprise from an array of vulnerabilities. Attend this 4-day course and learn to minimise your organization's exposure to security breaches.
Types of exploits: worm, spyware, backdoor, rootkits, Denial of Service (DoS)
Deploying exploit frameworks
Analysing Vulnerabilities and Exploits
Uncovering infrastructure vulnerabilities
Uncovering switch weaknesses
Vulnerabilities in infrastructure support servers
Network management tool attacks
Attacks against analyzers and IDS
Identifying Snort IDS bypass attacks
Corrupting memory and causing Denial of Service
Exposing server vulnerabilities
Scanning servers: assessing vulnerabilities on your network
Uploading rogue scripts and file inclusion
Catching input validation errors
Performing buffer overflow attacks
Cross–Site Scripting (XSS) and cookie theft
Revealing desktop vulnerabilities
Scanning for desktop vulnerabilities
Client buffer overflows
Silent downloading: spyware and adware
Identifying design errors
Configuring Scanners and Generating Reports
Implementing scanner operations and configuration
Choosing credentials, ports and dangerous tests
Preventing false negatives
Creating custom vulnerability tests
Customising Nessus scans
Handling false positives
Creating and interpreting reports
Filtering and customising reports
Interpreting complex reports
Contrasting the results of different scanners
Assessing Risks in a Changing Environment
Researching alert information
Using the National Vulnerability Database (NVD) to find relevant vulnerability and patch information
Evaluating and investigating security alerts and advisories
Employing the Common Vulnerability Scoring System (CVSS)
Identifying factors that affect risk
Evaluating the impact of a successful attack
Determining vulnerability frequency
Calculating vulnerability severity
Weighing important risk factors
Performing a risk assessment
The vulnerability management cycle
Standardising scanning with Open Vulnerability Assessment Language (OVAL)
Patch and configuration management
Analysing the vulnerability management process
Rewards for vulnerability discovery
Markets for bugs and exploits
Vulnerability Assessment Training FAQs
What is vulnerability assessment?
The process of defining, identifying, classifying and prioritising what vulnerabilities are in your system.
What is the purpose of a vulnerability assessment?
The purpose of this assessment is to find out what vulnerabilities may be within your system in time to fix them.
What is the difference between vulnerability assessment and penetration testing?
A vulnerability assessment scans for known vulnerabilities, while a penetration test tries to actively exploit and fix the weaknesses.
Can I learn vulnerability assessment online?
Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.