• Online, Self-Paced
Course Description

One of the critical things for anyone who wants to learn either how to defend or even attack a network, is the ability to find and analyze system or network vulnerabilities. In this course, Conducting Network Vulnerability Analysis, you will learn to how to follow a systematic process and use this to process and identify potential vulnerabilities. First, you will learn both passive and active vulnerability scanning methods. Next, you will learn to take the results of this data and analyze it to determine the vulnerabilities that can be used to attack, or identify the risk that needs to be mitigated. Finally, you will learn how to deploy three of the most popular vulnerability scanners and conduct comparisons of them. When you are finished with this course, you'll have the knowledge and skills needed to identify vulnerabilities and act appropriately.

Learning Objectives

  • Preparing the Toolkit
  • Performing the Scanning Methodology
  • Leveraging the Internet to Find Vulnerabilities
  • Types of Vulnerability Scanning
  • Executing Vulnerability Scanning

    Framework Connections

    The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

    Specialty Areas

    • Exploitation Analysis

    Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.