Vulnerability Assessment Training: Protecting Your Organisation

Nivå: Intermediate
Snittbetyg: 4,8/5 4,78/5 Based on 87 Reviews

In this Vulnerability Assessment training course, you learn how to create a network security vulnerability assessment checklist by exposing infrastructure, server, and desktop vulnerabilities, create and interpret reports, configure vulnerability scanners, detect points of exposure, and ultimately prevent network exploitation.

To minimise costly security breaches, organisations need to evaluate the risk in their enterprise from an array of vulnerabilities. Attend this 4-day course and learn to minimise your organization's exposure to security breaches.

Nyckelfunktioner:

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

Du kommer lära dig att:

  • Detect and respond to vulnerabilities, and minimise exposure to security breaches
  • Employ real-world exploits and evaluate their effect on your systems
  • Configure vulnerability scanners to identify weaknesses
  • Analyse the results of vulnerability scans
  • Establish an efficient strategy for vulnerability management

Välj den utbildningsform som passar dig bäst

LIVE, LÄRARLEDD

Klassrum och självstudier

  • 4-day instructor-led training course
  • One-on-one after course instructor coaching
  • Earn 23 CompTIA CEUs
  • Pay later by invoice -OR- at the time of checkout by credit card

FÖRETAGSINTERN UTBILDNING

Teamträning

  • Använd denna eller någon annan utbildning i ditt företag
  • Fullskalig programutveckling
  • Levereras när, var och hur du vill
  • Blandade utbildningsmodellerSkräddarsytt innehåll
  • Coaching av ett expertteam

Anpassa kurs och innehåll efter teamets behov

Kontakta oss

Utveckla dig och ditt team med anpassade eller öppna kurser alternativt e-learning

Learning Tree erbjuder kundanpassad utbildning hos er, öppna kurser i Stockholm, London eller Washington, möjlighet att delta via våra Anywhere centers (Malmö, Göteborg, Linköping, Stockholm eller Borlänge) eller olika former av e-learning med lärarstöd. Läs mer på www.learningtree.se/priser .

Klassrum och självstudier

Note: This course runs for 4 dagar *

*Events with the Partial Day Event clock icon run longer than normal but provide the convenience of half-day sessions.

  • 14 - 17 jul 9:00 - 4:30 EDT Online (AnyWare) Online (AnyWare) Boka Din Kursplats

  • 10 - 13 nov 9:00 - 4:30 EST Ottawa / Online (AnyWare) Ottawa / Online (AnyWare) Boka Din Kursplats

Kurs med startgaranti

När du ser symbolen för “Guaranteed to Run” vid ett kurstillfälle vet du att kursen blir av. Garanterat.

Partial Day Event

Learning Tree offers a flexible schedule program. If you cannot attend full day sessions, this option consists of four-hour sessions per day instead of the full-day session.

Important Vulnerability Assessment Course Information

Vulnerability Assessment Course Outline

  • Fundamentals

    Introduction

    • Defining vulnerability, exploit, threat and risk
    • Creating a vulnerability report
    • Conducting an initial scan
    • Common Vulnerabilities and Exposure (CVE) list

    Scanning and exploits

    • Vulnerability detection methods
    • Types of scanners
    • Port scanning and OS fingerprinting
    • Enumerating targets to test information leakage
    • Types of exploits: worm, spyware, backdoor, rootkits, Denial of Service (DoS)
    • Deploying exploit frameworks
  • Analysing Vulnerabilities and Exploits

    Uncovering infrastructure vulnerabilities

    • Uncovering switch weaknesses
    • Vulnerabilities in infrastructure support servers
    • Network management tool attacks

    Attacks against analyzers and IDS

    • Identifying Snort IDS bypass attacks
    • Corrupting memory and causing Denial of Service

    Exposing server vulnerabilities

    • Scanning servers: assessing vulnerabilities on your network
    • Uploading rogue scripts and file inclusion
    • Catching input validation errors
    • Performing buffer overflow attacks
    • SQL injection
    • Cross–Site Scripting (XSS) and cookie theft

    Revealing desktop vulnerabilities

    • Scanning for desktop vulnerabilities
    • Client buffer overflows
    • Silent downloading: spyware and adware
    • Identifying design errors
  • Configuring Scanners and Generating Reports

    Implementing scanner operations and configuration

    • Choosing credentials, ports and dangerous tests
    • Preventing false negatives
    • Creating custom vulnerability tests
    • Customising Nessus scans
    • Handling false positives

    Creating and interpreting reports

    • Filtering and customising reports
    • Interpreting complex reports
    • Contrasting the results of different scanners
  • Assessing Risks in a Changing Environment

    Researching alert information

    • Using the National Vulnerability Database (NVD) to find relevant vulnerability and patch information
    • Evaluating and investigating security alerts and advisories
    • Employing the Common Vulnerability Scoring System (CVSS)

    Identifying factors that affect risk

    • Evaluating the impact of a successful attack
    • Determining vulnerability frequency
    • Calculating vulnerability severity
    • Weighing important risk factors
    • Performing a risk assessment
  • Managing Vulnerabilities

    The vulnerability management cycle

    • Standardising scanning with Open Vulnerability Assessment Language (OVAL)
    • Patch and configuration management
    • Analysing the vulnerability management process

    Vulnerability controversies

    • Rewards for vulnerability discovery
    • Markets for bugs and exploits
    • Challenge programs

Teamträning

Vulnerability Assessment Training FAQs

  • What is vulnerability assessment?

    The process of defining, identifying, classifying and prioritising what vulnerabilities are in your system.

  • What is the purpose of a vulnerability assessment?

    The purpose of this assessment is to find out what vulnerabilities may be within your system in time to fix them.

  • What is the difference between vulnerability assessment and penetration testing?

    A vulnerability assessment scans for known vulnerabilities, while a penetration test tries to actively exploit and fix the weaknesses.

  • Can I learn vulnerability assessment online?

    Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.

Questions about which training is right for you?

call 08-506 668 00




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

*Partner-delivered courses may have different terms that apply. Ask for details.

Online (AnyWare)
Ottawa / Online (AnyWare)
Hur föredrar du att bli kontaktad:

Please Choose a Language

Canada - English

Canada - Français