Introduction into Vulnerability Assessment
Course Description
This is a lecture and lab based class giving an introduction to vulnerability assessment of some common common computing technologies. Instructor-led lab exercises are used to demonstrate specific tools and technologies.
Learning Outcomes
- Learning a general methodology for conducting assessments
- Scanning and mapping network topology
- Identifying listening ports/services on hosts
- Fingerprinting operating systems remotely
- Conducting automated vulnerability scans
- Auditing router, switch, and firewall security
- Auditing UNIX and Windows configuration and security
- Performing Web application and associated database security assessments
Course Curriculum
-
-
Lesson 1
-
Lesson 2
-
Lesson 3
-
Lesson 4
-
Lesson 5
-
