Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
Overview
Syllabus
Introduction
- Managing risk
- What you need to know
- Hacking ethically: Disclaimer
- Risks threats and vulnerabilities
- Common causes of vulnerabilities
- Assessing vulnerabilities
- Vulnerability management life cycle
- Modeling threats
- Challenge: Threat modeling exercise
- Solution: Threat modeling exercise
- Common Vulnerability Scoring System
- Common vulnerabilities and exposures
- Outsourcing vulnerability analysis
- Bug bounty white hat hacking
- Challenge: The Temporal metric group (new)
- Solution: The Temporal metric group (new)
- Installing Kali Linux
- Assessment tools
- Nikto demo
- Securing mobile devices
- Fuzz testing
- LAN vulnerability scanners
- Updates and patches
- Firewalls and HIDS
- Vulnerability assessment reports
- Challenge: Hacking a website
- Solution: Hacking a website
- Next steps
Taught by
Lisa Bock