Vulnerability assessment tools Course

1 hour, 24 minutes

Syllabus

Scanning tools

Video - 00:04:00

Learn about setting up vulnerability scanning criteria, reviewing resources, and scoping.
Angry IP demo

Video - 00:08:00

Review the installation of Angry IP scanner and learn its abilities.
Maltego demo

Video - 00:09:00

Dive into Maltego and try to get a better understanding of how to use this system.
Web scanning tools

Video - 00:04:00

Web application and vulnerability scanners are used to search servers, websites, or other applications on the internet for vulnerabilities. Learn about Nikto, Zed Attack Proxy (ZAP), Arachni, and lastly Burp Suite.
Nikto demo

Video - 00:04:00

In this episode, we will learn about Nikto as a vulnerability assessment tool.
OWASP ZAP demo

Video - 00:05:00

Learn to use OWASP ZAP as a vulnerability assessment tool.
Codename SCNR (formerly Arachni) demo

Video - 00:07:00

Learn how Codename SCNR (formerly Arachni) as a vulnerability assessment tool can help evaluate the security of web applications.
Burp Suite demo

Video - 00:05:00

In this episode, dive into the capabilities of Burp Suite.
Vulnerability scanning tools

Video - 00:03:00

Use vulnerability analysis tools to quickly see areas of weakness, along with the available resources and solutions to address the issues.
Nessus demo

Video - 00:12:00

Learn about Nessus abilities as a vulnerability scanning tool.
OpenVAS demo

Video - 00:11:00

In this episode, we will dive into OPENVAS as a vulnerability scanning tool.
Debugger tools

Video - 00:04:00

Debuggers are tools in cybersecurity that provide a way to look at the internal workings of a program. This will help us identify different bugs and crashes to identify vulnerabilities in our programs.
Multipurpose tools

Video - 00:04:00

There are many different multipurpose tools to help you on your cybersecurity journey. We will review several of these tools in this episode.
Cloud tools

Video - 00:03:00

Don’t forget about your cloud services and data. A good vulnerability assessment should include all cloud components as well as on-premises devices and computers.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust