Companies Home Search Profile

Ethical Hacking: Vulnerability Analysis

Focused View

Dale Meredith

1:25:45

134 View
  • 1. Course Overview.mp4
    02:01
  • 1. Overview - Some Things to Note.mp4
    05:48
  • 2. CEH Exam Study Tips.mp4
    04:24
  • 3. What Is Vulnerability Assessment.mp4
    01:39
  • 4. Vulnerability Scoring Systems and Databases.mp4
    04:32
  • 5. The Lifecycle.mp4
    02:02
  • 6. Pre-assessment Phase.mp4
    01:45
  • 7. Vulnerability Assessment Phase.mp4
    01:41
  • 8. Post Assessment Phase.mp4
    00:46
  • 9. Learning Check.mp4
    01:12
  • 1. Classifications.mp4
    05:28
  • 2. Active and Passive.mp4
    02:50
  • 3. Host, Network, and Wireless.mp4
    02:39
  • 4. Application and Databases.mp4
    01:51
  • 5. Credentialed and Non-credentialed.mp4
    02:34
  • 6. Manual and Automated.mp4
    01:19
  • 7. Learning Check.mp4
    00:56
  • 01. Comparing Approaches to Vulnerability Assessments.mp4
    02:44
  • 02. Characteristics to Look for in a Vulnerability Assessment Software.mp4
    02:04
  • 03. Workings on Vulnerability Scanning Solutions.mp4
    01:53
  • 04. Types of Vulnerability Assessment Tools.mp4
    03:32
  • 05. Choosing a Vulnerability Assessment Tool.mp4
    01:58
  • 06. Best Practices for Selecting Vulnerability Assessment Tools.mp4
    01:33
  • 07. Demo - OpenVAS.mp4
    03:59
  • 08. Demo - Nikto.mp4
    05:34
  • 09. Vulnerability Assessment Tools for Mobile.mp4
    01:40
  • 10. Learning Check.mp4
    01:11
  • 1. The Trick to Interpreting Reports.mp4
    03:04
  • 2. False Positives and Exceptions.mp4
    02:29
  • 3. Keeping up with the Trends.mp4
    05:40
  • 4. Learning Check.mp4
    02:52
  • 1. Domain Summary.mp4
    02:05
  • Description


    Vulnerability assessment plays a major role in providing security to any organization’s resources and infrastructure from various internal and external threats. This course will teach you vulnerability analysis techniques needed for the Certified Ethical Hackers exam

    What You'll Learn?


      Networks are more complex than ever, and systems today are so interconnected, and buried within those systems are thousands of undetected security vulnerabilities waiting to be used against you.

      In this course, Ethical Hacking: Vulnerability Analysis, you’ll learn to better defend your organization from threats by using, tweaking and understanding a vulnerability management solutions

      First, you’ll explore the various types of scans attackers can deploy against you and how to pick and design your own vulnerability management program.

      Next, you’ll discover how attacks can execute vulnerability scans and what they might see on your network.

      Finally, you’ll learn how to report and analyze the results from a scan.

      When you’re finished with this course, you’ll have the skills and knowledge of an ethical hacker, needed for the 312-50 exam.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Dale Meredith
    Dale Meredith
    Instructor's Courses
    Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale's instruction is memorable and entertaining. Dale's knowledge and understanding of current trends in technology and applications have led to many opportunities, such as: training various Inc 500 companies, universities, and Divisions of the Department of Homeland Security for the United States government. Along with authoring for Pluralsight, consulting, and IT classroom training, you can catch Dale on stage speaking at IT conferences, helping IT teams keep their companies safe, relevant, and "breach" aware. Outside of the professional sphere, Dale spends quite a bit of his time giving back by speaking at adult and youth non-profit community gatherings and posting on his 'Dale Dumbs IT Down' social media sites. Dale uses these speaking engagements and social media sites to 'Dumb Down IT' concepts with the intent to help everyone be safe and smart with their technology and personal devices. Dale also specializes in Active Directory, Exchange Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 32
    • duration 1:25:45
    • level average
    • English subtitles has
    • Release Date 2023/01/08

    Courses related to Ethical Hacking