Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Ethical Hacking: Vulnerability Analysis

Description

Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.

Tags

Syllabus

Introduction
  • Managing risk
  • What you need to know
  • Hacking ethically: Disclaimer
1. Managing Organizational Risk
  • Risks threats and vulnerabilities
  • Common causes of vulnerabilities
  • Assessing vulnerabilities
  • Vulnerability management life cycle
  • Modeling threats
  • Challenge: Threat modeling exercise
  • Solution: Threat modeling exercise
2. Analyzing Vulnerabilities
  • Common Vulnerability Scoring System
  • Common vulnerabilities and exposures
  • Outsourcing vulnerability analysis
  • Bug bounty white hat hacking
  • Challenge: The Temporal metric group (new)
  • Solution: The Temporal metric group (new)
3. Vulnerability Assessment Tools
  • Installing Kali Linux
  • Assessment tools
  • Nikto demo
  • Securing mobile devices
  • Fuzz testing
4. Defending the LAN
  • LAN vulnerability scanners
  • Updates and patches
  • Firewalls and HIDS
  • Vulnerability assessment reports
  • Challenge: Hacking a website
  • Solution: Hacking a website
Conclusion
  • Next steps

Online Course


Ethical Hacking: Vulnerability Analysis

Affiliate notice

Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.

Introduction
  • Managing risk
  • What you need to know
  • Hacking ethically: Disclaimer
1. Managing Organizational Risk
  • Risks threats and vulnerabilities
  • Common causes of vulnerabilities
  • Assessing vulnerabilities
  • Vulnerability management life cycle
  • Modeling threats
  • Challenge: Threat modeling exercise
  • Solution: Threat modeling exercise
2. Analyzing Vulnerabilities
  • Common Vulnerability Scoring System
  • Common vulnerabilities and exposures
  • Outsourcing vulnerability analysis
  • Bug bounty white hat hacking
  • Challenge: The Temporal metric group (new)
  • Solution: The Temporal metric group (new)
3. Vulnerability Assessment Tools
  • Installing Kali Linux
  • Assessment tools
  • Nikto demo
  • Securing mobile devices
  • Fuzz testing
4. Defending the LAN
  • LAN vulnerability scanners
  • Updates and patches
  • Firewalls and HIDS
  • Vulnerability assessment reports
  • Challenge: Hacking a website
  • Solution: Hacking a website
Conclusion
  • Next steps