Information Technology
Star icon
Most Popular
Hands on Training icon
Hands On Training
Star icon
Hands on Training icon

Ethical Hacking: Vulnerability Analysis

Course Cover
compare button icon

Course Features

icon

Duration

3.23 hours

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Effort

3 hours per week

icon

Teaching Type

Self Paced

icon

Video Content

3.23 hours

Course Description

Pluralsight does not have the status of an accredited training center or official partner of the EC-Council. Networks are no longer what they used to be. They are more complex than ever. Today's systems are interconnected and there are thousands of security holes that can be exploited against you. An attacker will use vulnerability analysis to find loopholes in your organization's infrastructure. They will use any vulnerabilities they find to penetrate your systems and gain access to them. This course Ethical Hacking - Vulnerability Analysis will teach you how to secure your infrastructures using the same tools and techniques attackers use to scan your network for possible attack vectors. You'll learn about the various types of vulnerabilities and the types of scans that can be used to detect them. Next, you will need to comply with any regulatory requirements. Next, you will learn about VMS (Vulnerability Management Software), and how to select the one that best suits your company. You will also learn how to prioritize vulnerabilities and what steps you need to take to fix them. You'll be able to use your "Utility Belt" skills and knowledge as an ethical hacker in vulnerability analysis once you have completed this course.

Course Overview

projects-img

International Faculty

projects-img

Case Based Learning

projects-img

Post Course Interactions

projects-img

Case Studies,Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Shaping and Implementing Our Vulnerability Scans

The Scanners

Analyzing Vulnerability Scans

Remediation and Change Control

Remediating Host Vulnerabilities

Remediating Network Vulnerabilities

Remediating Virtual Environment Vulnerabilities

Course Instructors

Author Image

Dale Meredith

Instructor

Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT mana...
Course Cover