Completed
Remote exploitable vulnerabilities
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Prioritize Vulnerability Remediation
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 Unique vulnerabilities
- 4 Vulnerability definition
- 5 Exploit definition
- 6 Exploit kit definition
- 7 How exploit kits work
- 8 Example exploit kits
- 9 How can exploit kits help defenders
- 10 Vulnerability vs Exploit
- 11 Vulnerability Chart
- 12 Questions
- 13 Resources
- 14 Highrisk software
- 15 Remote exploitable vulnerabilities
- 16 Unsupported or endoflife software
- 17 Endoflife software
- 18 High lateral movement
- 19 Example vulnerabilities
- 20 Summary