Companies Home Search Profile

Ethical Hacking: Vulnerability Analysis

Focused View

Lisa Bock

1:26:26

0 View
  • 01 Managing risk.mp4
    01:12
  • 02 What you need to know.mp4
    00:42
  • 03 Hacking ethically Disclaimer.mp4
    00:54
  • 04 Risks threats and vulnerabilities.mp4
    04:16
  • 05 Common causes of vulnerabilities.mp4
    03:42
  • 06 Assessing vulnerabilities.mp4
    03:47
  • 07 Vulnerability management life cycle.mp4
    04:44
  • 08 Modeling threats.mp4
    04:07
  • 09 Challenge Threat modeling exercise.mp4
    01:09
  • 10 Solution Threat modeling exercise.mp4
    02:17
  • 11 Common Vulnerability Scoring System.mp4
    05:10
  • 12 Common vulnerabilities and exposures.mp4
    03:36
  • 13 Outsourcing vulnerability analysis.mp4
    02:41
  • 14 Bug bounty white hat hacking.mp4
    03:19
  • 15 Challenge The Temporal metric group (new).mp4
    01:36
  • 16 Solution The Temporal metric group (new).mp4
    03:00
  • 17 Installing Kali Linux.mp4
    03:34
  • 18 Assessment tools.mp4
    05:46
  • 19 Nikto demo.mp4
    02:12
  • 20 Securing mobile devices.mp4
    04:53
  • 21 Fuzz testing.mp4
    04:22
  • 22 LAN vulnerability scanners.mp4
    04:40
  • 23 Updates and patches.mp4
    02:44
  • 24 Firewalls and HIDS.mp4
    02:40
  • 25 Vulnerability assessment reports.mp4
    03:31
  • 26 Challenge Hacking a website.mp4
    00:43
  • 27 Solution Hacking a website.mp4
    03:33
  • 28 Next steps.mp4
    01:36
  • Description


    In order to assess—and ultimately, decrease—an organization's risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you're working to strengthen network security at your organization, it's essential to have a solid grasp of the processes, methodologies, and tools needed to assess vulnerabilities. In this course, security expert Lisa Bock takes a deep dive into the topic of vulnerability scanning, covering what you need to know to find and address weaknesses that attackers might exploit. Lisa goes over the basics of managing organizational risk, discusses vulnerability analysis methodologies, and shows how to work with vulnerability assessment tools, including Nikto and OpenVAS. Plus, she shares tools and strategies for defending the LAN. Lisa also includes challenge chapters to test your knowledge of each section, along with solutions videos for each challenge.

    Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 11.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Experienced author with a demonstrated history of working in the e-learning industry. She is a security ambassador with a broad range of IT skills and knowledge, including networking, CyberOps, Wireshark, biometrics, Ethical Hacking and the IoT. Lisa is an author for LinkedIn Learning, Packt Publishing and CompTIA and is an award-winning speaker who has presented at several national conferences. She holds a MS in computer information systems/information assurance from UMGC. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, PA) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband Mike enjoy bike riding, watching movies, and traveling.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 28
    • duration 1:26:26
    • English subtitles has
    • Release Date 2024/09/22