Threat and Vulnerability Assessment for Enterprises [Video]
- FREE Subscription Access now
- $12.99 Video + Subscription Buy
-
What do you get with a Packt Subscription?
- Instant access to this title and 7,500+ eBooks & Videos
- Constantly updated with 100+ new titles each month
- Breadth and depth in over 1,000+ technologies
-
Course Introduction
-
Lab Setup
-
Open Source Intelligence Gathering
-
Network and Website Services Enumeration
-
Web Application Vulnerability Enumeration
-
Network Vulnerability Enumeration
-
Discovery of Major Cyber Security Vulnerabilities in Web Application
-
Discovery of Other Cyber Security Vulnerabilities in Websites
-
Discovery of Major Cyber Security Vulnerabilities in Networks
-
Discovery of Other Cyber Security Vulnerabilities in Networks
-
Triage – Security Incidents
-
Remediation of Cyber Attacks on Organizations
About this video
Technology continues to evolve more rapidly than ever, and the demand for enterprises to continuously update their policies is more vital than ever. No longer are attackers continuing to throw sophisticated attacks that can cripple a business (ex. Ransomware) at the largest companies. Small and medium-sized businesses are no longer safe, and in many cases after a cyber-attack, companies are rarely prepared for future incidents.
In this course, we’ll cover threat and vulnerability management. We introduce you to the core components of comprehensive vulnerability assessment, and provide the hands-on instruction necessary to produce a vigorous defensive strategy from day one.
The course is focused on equipping information security personnel from midsize to large organizations charged with effectively and efficiently securing a few hundred or more systems. By the end of the course, you’ll build a solid base around the entire vulnerability management process including the understanding of vulnerabilities, identifying and ranking the security issues, and recommending solutions to remediate the security issues. This process will also help to prevent security breaches.
Style and Approach
This course is full of hands-on instructions, interesting and illustrative examples, and clear explanations. The viewer can create short notes to remember useful methods and tools available in the course. It’s hands-on and practical to help you understand enterprise-level cyber-attacks.
- Publication date:
- February 2019
- Publisher
- Packt
- Duration
- 5 hours 43 minutes
- ISBN
- 9781838559205