Vulnerability scanning methods and concepts Course

1 hour, 31 minutes

Syllabus

Asset discovery

Video - 00:23:00

Network components can be all over the place, both physically and logically. You have to understand how your network nodes are physically connected and logically organized to secure them from attack.
Industry frameworks

Video - 00:24:00

Learn about the various best practices frameworks available for security implementation.
Critical infrastructure

Video - 00:10:00

As a cybersecurity analyst, we often have to deal with aspects of our environment and security that are critical in nature. Understand critical infrastructure, operational technology that corresponds with critical infrastructure, industrial control systems (ICS), and SCADA depending on where you are in the world.
Vulnerability identification and scanning

Video - 00:15:00

Understanding threats is a good first step, but you need to know the vulnerabilities that could let an attacker into your environment. You have to search for vulnerabilities and mitigate each one to protect the network from potential threats.
Special considerations

Video - 00:09:00

All scans are not the same. Understanding the specifics and nuances of a network environment can produce better results while avoiding many common issues.
Software vulnerability assessment

Video - 00:11:00

Learn how about software vulnerability assessment from a cybersecurity analyst perspective.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust