New Training: Vulnerability Assessment and Reponse Procedures
In this 6-video skill, CBT Nuggets trainer John Munjoma focuses on using vulnerability assessment tools as well as procedures taken when discovering wireless vulnerabilities. Watch this new CompTIA training.
Watch the full course: CompTIA Cybersecurity Analyst
This training includes:
38 minutes of training
You’ll learn these topics in this skill:
Infrastructure Vulnerability Scanner
Exploits and Mitigation
Implementing Security Controls Part 1
Implementing Security Controls Part 2
What are Vulnerability Scanners and Why are They Important?
Today's IT environments are constantly evolving and becoming more technologically-advanced to meet the needs of today's dynamic businesses. And as these environments grow, malicious entities are looking to capitalize on these ever-evolving changes within an organization to uncover inadvertent vulnerabilities exposed in the adoption of new technologies. To combat this, organizations are leveraging the use of vulnerability scanners to identify vulnerabilities before malicious entities can find them to exploit an organization.
Since IT organizations are so complex, organizations benefit from using dedicated vulnerability scanners that are designed to assess vulnerabilities at various layers of the IT architecture. For instance, network-based vulnerability scanners are dedicated to searching for network-based vulnerabilities, whereas, database vulnerability scanners are designed to assess the vulnerabilities at the database level.
delivered to your inbox.