In this Vulnerability Assessment training course, you learn how to create a network security vulnerability assessment checklist by exposing infrastructure, server, and desktop vulnerabilities, create and interpret reports, configure vulnerability scanners, detect points of exposure, and ultimately prevent network exploitation.
To minimize costly security breaches, organizations need to evaluate the risk in their enterprise from an array of vulnerabilities. Attend this 4-day course and learn to minimize your organization's exposure to security breaches.
TRAINING AT YOUR SITE
Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.
Sep 24 - 27 9:00 AM - 4:30 PM EDT Rockville, MD / Online (AnyWare) Reserve Your Seat
Oct 29 - Nov 1 9:00 AM - 4:30 PM EDT Alexandria, VA / Online (AnyWare) Reserve Your Seat
Nov 19 - 22 9:00 AM - 4:30 PM EST Ottawa / Online (AnyWare) Reserve Your Seat
Jan 14 - 17 9:00 AM - 4:30 PM EST Greenbelt,MD / Online (AnyWare) Reserve Your Seat
Feb 25 - 28 9:00 AM - 4:30 PM EST Greenbelt,MD / Online (AnyWare) Reserve Your Seat
Mar 24 - 27 9:00 AM - 4:30 PM EDT Rockville, MD / Online (AnyWare) Reserve Your Seat
Apr 21 - 24 9:00 AM - 4:30 PM EDT Alexandria, VA / Online (AnyWare) Reserve Your Seat
May 19 - 22 9:00 AM - 4:30 PM EDT Ottawa / Online (AnyWare) Reserve Your Seat
Jun 2 - 5 9:00 AM - 4:30 PM EDT Greenbelt,MD / Online (AnyWare) Reserve Your Seat
Guaranteed to RunWhen you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.
Scanning and exploits
Uncovering infrastructure vulnerabilities
Attacks against analyzers and IDS
Exposing server vulnerabilities
Revealing desktop vulnerabilities
Implementing scanner operations and configuration
Creating and interpreting reports
Researching alert information
Identifying factors that affect risk
The vulnerability management cycle
The process of defining, identifying, classifying and prioritizing what vulnerabilities are in your system.
The purpose of this assessment is to find out what vulnerabilities may be within your system in time to fix them.
A vulnerability assessment scans for known vulnerabilities, while a penetration test tries to actively exploit and fix the weaknesses.
Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.
Your Training Comes with a 100% Satisfaction Guarantee!*
*Partner-delivered courses may have different terms that apply. Ask for details.