Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Description
Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
Tags
Syllabus
Introduction
- Managing risk
- What you need to know
- Hacking ethically: Disclaimer
- Risks threats and vulnerabilities
- Common causes of vulnerabilities
- Assessing vulnerabilities
- Vulnerability management life cycle
- Modeling threats
- Challenge: Threat modeling exercise
- Solution: Threat modeling exercise
- Common Vulnerability Scoring System
- Common vulnerabilities and exposures
- Outsourcing vulnerability analysis
- Bug bounty white hat hacking
- Challenge: The Temporal metric group (new)
- Solution: The Temporal metric group (new)
- Installing Kali Linux
- Assessment tools
- Nikto demo
- Securing mobile devices
- Fuzz testing
- LAN vulnerability scanners
- Updates and patches
- Firewalls and HIDS
- Vulnerability assessment reports
- Challenge: Hacking a website
- Solution: Hacking a website
- Next steps
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/6aad606e85b0.jpeg)
Ethical Hacking: Vulnerability Analysis
Affiliate notice
-
TypeOnline Course
-
Provider
Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
Introduction
- Managing risk
- What you need to know
- Hacking ethically: Disclaimer
- Risks threats and vulnerabilities
- Common causes of vulnerabilities
- Assessing vulnerabilities
- Vulnerability management life cycle
- Modeling threats
- Challenge: Threat modeling exercise
- Solution: Threat modeling exercise
- Common Vulnerability Scoring System
- Common vulnerabilities and exposures
- Outsourcing vulnerability analysis
- Bug bounty white hat hacking
- Challenge: The Temporal metric group (new)
- Solution: The Temporal metric group (new)
- Installing Kali Linux
- Assessment tools
- Nikto demo
- Securing mobile devices
- Fuzz testing
- LAN vulnerability scanners
- Updates and patches
- Firewalls and HIDS
- Vulnerability assessment reports
- Challenge: Hacking a website
- Solution: Hacking a website
- Next steps
Loading...
Saving...
Loading...