Introduction to Vulnerability Management
  • About Your Instructor
ACT I: Basics of Vulnerability Management
  • Introduction to Become an Expert in Vulnerability Management
  • Risk
  • Five Principles of Threat Based Security
  • Common Vulnerability Scoring System
  • The Security TRIAD
  • Attack Vector
  • Post Compromise/ Threat
ACT II: Types of Vulnerabilities
  • Types of Vulnerabilties
  • TCP/IP Vulnerabilities
  • IP Vulnerabilities
  • ICMP Vulnerabilties
  • TCP Vulnerabilities
  • TCP Session HiJacking
  • UDP Vulnerabilties
ACT III: Penetration Testing vs Vulnerability Management
  • Penetration Testing vs Vulnerability Management
  • Predicting Vulnerabilties
  • Poor Logging Vulnerability
Vulnerability Management Lab
  • Preliminary Scanning with NMAP
  • NESSUS Scanner Lab
  • Wireshark Lab
  • Vulnerability Analysis Lab
  • Cryptography Lab
Penetration Testing Lab
  • Basic Scanning
  • Identifying System Vulnerabilities with OpenVAS
  • Analyzing SQL Attack
Course Summary
  • Thank You for Attending
  • Bonus For Students!