PDF Add to WishList
To minimize costly security breaches, organizations need to evaluate the risk in their enterprise from an array of vulnerabilities. In this training course, you learn how to create a network security vulnerability assessment checklist by exposing infrastructure, server, and desktop vulnerabilities, create and interpret reports, configure vulnerability scanners, detect points of exposure, and ultimately prevent network exploitation.
Scanning and exploits
Uncovering infrastructure vulnerabilities
Attacks against analyzers and IDS
Exposing server vulnerabilities
Revealing desktop vulnerabilities
Implementing scanner operations and configuration
Creating and interpreting reports
Researching alert information
Identifying factors that affect risk
The vulnerability management cycle
Course Tuition Includes:
After-Course Instructor Coaching
When you return to work, you are entitled to schedule a free coaching session with your instructor for help and guidance as you apply your new skills.
Free Course Exam
You can take your Learning Tree course exam on the last day of your course or online any time after class.
Standard Course Hours: 9:00 am – 4:30 pm
*Informal discussion with instructor about your projects or areas of special interest: 4:30 pm – 5:30 pm
“I’ve taken many courses with Learning Tree so I know what I’m talking about when I say the courses are really, really good. You get effective, practical knowledge that you can start using immediately.”
- G. Grosfeld, Computer Scientist
Federal Aviation Administration