PDF Add to WishList
To minimize costly security breaches, organizations need to evaluate the risk in their enterprise from an array of vulnerabilities. In this training course, you learn how to create a network security vulnerability assessment checklist by exposing infrastructure, server, and desktop vulnerabilities, create and interpret reports, configure vulnerability scanners, detect points of exposure, and ultimately prevent network exploitation.
Scanning and exploits
Uncovering infrastructure vulnerabilities
Attacks against analyzers and IDS
Exposing server vulnerabilities
Revealing desktop vulnerabilities
Implementing scanner operations and configuration
Creating and interpreting reports
Researching alert information
Identifying factors that affect risk
The vulnerability management cycle
Course Tuition Includes:
After-Course Instructor Coaching
When you return to work, you are entitled to schedule a free coaching session with your instructor for help and guidance as you apply your new skills.
Free Course Exam
You can take your Learning Tree course exam on the last day of your course or online any time after class.
Standard Course Hours: 9:00 am – 4:30 pm
*Informal discussion with instructor about your projects or areas of special interest: 4:30 pm – 5:30 pm
“I had worked with some of the technologies before on my own just to get an understanding of them, but the Learning Tree Courses really helped tie up a lot of loose ends and expose certain aspects that I wasn’t aware of.”
- G. Watts, Systems & Support Manager