Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
Overview
Syllabus
Introduction
- Managing risk
- Discovering resources
- Hacking ethically: Disclaimer
- Risks threats and vulnerabilities
- Recognizing common vulnerabilities
- Classifying vulnerabilities
- Assessing vulnerabilities
- Vulnerability management life cycle
- Modeling threats
- Challenge: Threat modeling exercise
- Solution: Threat modeling exercise
- Common Vulnerability Scoring System
- Common vulnerabilities and exposures
- Outsourcing vulnerability analysis
- Bug bounty white hat hacking
- Challenge: The Temporal metric group
- Solution: The Temporal metric group
- Installing Kali Linux
- Assessment tools
- Nikto demo
- Securing mobile devices
- Fuzz testing
- LAN vulnerability scanners
- Scanning the LAN
- Selecting a vulnerability assessment tool
- Updates and patches
- Firewalls and HIDS
- Vulnerability assessment reports
- Next steps
Taught by
Lisa Bock