In this Vulnerability Assessment training course, you learn how to create a network security vulnerability assessment checklist by exposing infrastructure, server, and desktop vulnerabilities, create and interpret reports, configure vulnerability scanners, detect points of exposure, and ultimately prevent network exploitation.
To minimize costly security breaches, organizations need to evaluate the risk in their enterprise from an array of vulnerabilities. Attend this 4-day course and learn to minimize your organization's exposure to security breaches.
TRAINING AT YOUR SITE
Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.
*Events with the Partial Day Event clock icon run longer than normal but provide the convenience of half-day sessions.
Jul 14 - 17 9:00 AM - 4:30 PM EDT Online (AnyWare) Reserve Your Seat
Nov 10 - 13 9:00 AM - 4:30 PM EST Ottawa / Online (AnyWare) Reserve Your Seat
Jan 12 - 15 9:00 AM - 4:30 PM EST Greenbelt,MD / Online (AnyWare) Reserve Your Seat
Guaranteed to RunWhen you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time — will run. Guaranteed.
Partial Day EventLearning Tree offers a flexible schedule program. If you cannot attend full day sessions, this option consists of four-hour sessions per day instead of the full-day session.
Scanning and exploits
Uncovering infrastructure vulnerabilities
Attacks against analyzers and IDS
Exposing server vulnerabilities
Revealing desktop vulnerabilities
Implementing scanner operations and configuration
Creating and interpreting reports
Researching alert information
Identifying factors that affect risk
The vulnerability management cycle
The process of defining, identifying, classifying and prioritizing what vulnerabilities are in your system.
The purpose of this assessment is to find out what vulnerabilities may be within your system in time to fix them.
A vulnerability assessment scans for known vulnerabilities, while a penetration test tries to actively exploit and fix the weaknesses.
Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.