From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 22,700 courses taught by industry experts or purchase this course individually.
Assessing vulnerabilities
From the course: Ethical Hacking: Vulnerability Analysis
Assessing vulnerabilities
- [Instructor] Assessing vulnerabilities is very important as part of an overall security plan as it's the first step in decreasing overall organizational risk. Assessing vulnerabilities involves various tools, techniques, and methods used to identify and prioritize vulnerabilities within an organization. Network scanning probes targets on the network to detect open ports, determine software, operating systems, and known vulnerabilities. There are many approaches that you can take but it's important to understand that the network is complicated and can be thought of in two separate areas, information systems and information technology. Information systems is the software side. This ensures data availability and it drives business processes and decision-making. It includes database management systems, management information systems, and decision support systems. Information technology generally refers to the hardware…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.