Learning Outcome:
Requirement:
Course Curriculum
Recipe 3: Find the weaknesses: Vulnerability scanning & Assessment
Available in
days
days
after you enroll
-
Start
The vulnerability concept and databases (CVE, NVD, Bugtraq, CVSS)
(6:35)
-
Start
The most common questions with answers
(6:55)
-
Start
Finding vulnerabilities using Nmap and its scripts
(9:29)
-
Start
Installing and Configuring Nessus
(9:04)
-
Start
Nessus Scanning & Policy Management
(10:45)
-
Start
Nessus Scan Analysis and reporting
(8:12)
-
StartThe vulnerability concept and databases (CVE, NVD, Bugtraq, CVSS) (6:35)
-
StartThe most common questions with answers (6:55)
-
StartFinding vulnerabilities using Nmap and its scripts (9:29)
-
StartInstalling and Configuring Nessus (9:04)
-
StartNessus Scanning & Policy Management (10:45)
-
StartNessus Scan Analysis and reporting (8:12)
Your Instructor
Irfan Shakeel
Irfan Shakeel, the founder of the ehacking project, also hosts classes at EH Academy. He has found many vulnerabilities in the world’s known platforms, he has been providing IT security training since 2010. You might have read his articles and opinion on IBM Developers, Infosec Institute, AlienVault, EH Academy and other known blogs. Follow him on Twitter, LinkedIn and Quora.
Reviews
Your Instructor
Irfan Shakeel, the founder of the ehacking project, also hosts classes at EH Academy. He has found many vulnerabilities in the world’s known platforms, he has been providing IT security training since 2010. You might have read his articles and opinion on IBM Developers, Infosec Institute, AlienVault, EH Academy and other known blogs. Follow him on Twitter, LinkedIn and Quora.
Course Curriculum
-
StartThe vulnerability concept and databases (CVE, NVD, Bugtraq, CVSS) (6:35)
-
StartThe most common questions with answers (6:55)
-
StartFinding vulnerabilities using Nmap and its scripts (9:29)
-
StartInstalling and Configuring Nessus (9:04)
-
StartNessus Scanning & Policy Management (10:45)
-
StartNessus Scan Analysis and reporting (8:12)