A vulnerability
assessment is the process of identifying, quantifying, and prioritizing (or
ranking) the security issues (vulnerabilities) in a system or network. This risk is usually associated with the Confidentiality, Integrity,
or Availability (CIA) of information or an asset.
This course teaches Vulnerability Assessments
and issues to look for. We will also learn about vulnerability scanning, wireless
assessment, and pen test methodology.
This course will cover:
·
Vulnerability Assessment
·
Wireless Assessment
·
Pen Test Methodology
·
External and Internal Pen Test
·
Exploitable Vulnerabilities
·
Detect and Prevent Intrusions
·
Firewall/DMZ Assessment
·
Quiz