The first step to solving a problem is recognizing that you have one, and that goes double for systems. With this course, you’ll review four videos covering the details of the vulnerability scanning process. Explore common vulnerability scanners, scanning considerations (when do you scan? What protocols do you use? What about fragile or non-traditional systems?), application and container scans, and analyzing the scan data once the scan has been completed.
Vulnerability ScanningDuration: 8:50
Scanning ConsiderationsDuration: 5:38
Application and Container ScansDuration: 2:53
Analyzing Vulnerability ScansDuration: 7:10
Meet the author
Jason Dion specializes in actionable information you can use to further your Cyber Security and Information Technology career. He provides IT certification and training videos to help students prepare for a career in the Information Technology and Cyber Security field, providing you with the real world training and application to today's cyber security challenges.
Jason Dion, CISSP No. 349867, is an Instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, PRINCE2, PRINCE2 Agile, and ITIL.
You're in good company
"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had."
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"I’ve taken five boot camps with Infosec and all my instructors have been great."