In this Vulnerability Assessment training course, you learn how to create a network security vulnerability assessment checklist by exposing infrastructure, server, and desktop vulnerabilities, create and interpret reports, configure vulnerability scanners, detect points of exposure, and ultimately prevent network exploitation.
To minimise costly security breaches, organisations need to evaluate the risk in their enterprise from an array of vulnerabilities. Attend this 4-day course and learn to minimise your organization's exposure to security breaches.
TRAINING AT YOUR SITE
Guaranteed to RunWhen you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time — will run. Guaranteed.
Scanning and exploits
Uncovering infrastructure vulnerabilities
Attacks against analyzers and IDS
Exposing server vulnerabilities
Revealing desktop vulnerabilities
Implementing scanner operations and configuration
Creating and interpreting reports
Researching alert information
Identifying factors that affect risk
The vulnerability management cycle
The process of defining, identifying, classifying and prioritising what vulnerabilities are in your system.
The purpose of this assessment is to find out what vulnerabilities may be within your system in time to fix them.
A vulnerability assessment scans for known vulnerabilities, while a penetration test tries to actively exploit and fix the weaknesses.
Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.
Penetration Testing Training: Tools and Techniques — NCSC Certified TrainingDisaster Recovery and Business Continuity TrainingJava/C# Secure Coding Training for Web Applications and ServicesOfficial (ISC)2® CISSP Training and Certification Prep (with Exam Voucher)