Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Ethical Hacking: Vulnerability Analysis

via LinkedIn Learning

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.

Syllabus

Introduction
  • Managing risk
  • Discovering resources
  • Hacking ethically: Disclaimer
1. Managing Organizational Risk
  • Risks threats and vulnerabilities
  • Recognizing common vulnerabilities
  • Classifying vulnerabilities
  • Assessing vulnerabilities
  • Vulnerability management life cycle
  • Modeling threats
  • Challenge: Threat modeling exercise
  • Solution: Threat modeling exercise
2. Analyzing Vulnerabilities
  • Common Vulnerability Scoring System
  • Common vulnerabilities and exposures
  • Outsourcing vulnerability analysis
  • Bug bounty white hat hacking
  • Challenge: The Temporal metric group
  • Solution: The Temporal metric group
3. Vulnerability Assessment Tools
  • Installing Kali Linux
  • Assessment tools
  • Nikto demo
  • Securing mobile devices
  • Fuzz testing
4. Defending the LAN
  • LAN vulnerability scanners
  • Scanning the LAN
  • Selecting a vulnerability assessment tool
  • Updates and patches
  • Firewalls and HIDS
  • Vulnerability assessment reports
Conclusion
  • Next steps

Taught by

Lisa Bock

Reviews

4.7 rating at LinkedIn Learning based on 428 ratings

Start your review of Ethical Hacking: Vulnerability Analysis

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.