back

Vulnerability Scanning Types and Concepts

2 H 46 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
Episodes
Episodes
  • Implement Vulnerability Scanning Methods and Concepts
    • Overview
    • Asset Discovery and Mapping
    • Vulnerability Scanning Types and Considerations
    • Vulnerability Scanning Frameworks
  • Analyze Output from Vulnerability Assessment Tools
    • Analyze Vulnerability Assessment Scanner Output
  • Analyze Data to Prioritize Vulnerabilities
    • CVSS
    • Vulnerability Prioritization
  • Recommend Controls to Mitigate Attacks and Software Vulnerabilities
    • Software Vulnerability Mitigations

Overview

3 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

In this episode, we take a few moments to meet the hosts and go over what you can expect from this course.

WEBVTT >> Well in. Welcome to the overview for vulnerability, scanning types and concept. I'm going to your host for the score. So few good when I recently 10, my first cyber security certifications on excited about that. You may have also seen the hosting other security focused courses alongside Daniel here. I'm going to be asking questions throughout this course questions you might have at home, but I'm not here to ask. Some has them for you. >> Daniel Miller, you tell us a little about yourself. I'm doing great, Sophie and I look forward to doing this course with you because we have a lot of fun doing these things and that fund will translate to you hopefully but enough about that a little about yours, truly. Yes, my name is Daniel Lowry and I will be your cybersecurity sme for this series of a lot of fun. And just to give you a little bit of background working on it from little over 20 years, this point been working a separate security around 6 or years at this point as well. So I've got 6 difference. Vendor recognize certifications. You know, that's what gives me those credentials to walk you through vulnerability, scanning assessments, management on stuff of real talk about inside the stores. >> So as we're watching this course, what exactly are we looking to get out of it? >> We're looking to get out of this is the understanding of vulnerability, scanning the different types, the concepts that surround that and just to have some good working knowledge of what vulnerability management is in how we do. It's all right. So we're going to actually kind of break this course up in the 4 small the mains. The first one is going to be about implementing standing and vulnerabilities, methods and concepts are so we can cover those basics at first. So acid discovery scanning times frameworks that you might run into all the all the permit information, kind of get you going. And then as we move along, we're going to start looking at the output from those vulnerability assessment and tools and analyzing now what we do with this. What am I supposed to understand when it comes to this? Then one as we continue down this little road of ours, a little yellow brick road as it is and we're going to analyze that data to prioritize vulnerability. Mitigations a okay. Now that I know of my abilities are which ones the most like exciting that we that kind of need to get that to a staff. And one count of the are the ones that we need to push to the back burner and not take up all our time. You get those more prioritize ones. How do we prioritize those things? And finally, we're going to recommend some controls for mitigations. Okay. Now that we know the priority, which we need to do things what we do to fix it, how do we fix those things? Recover some of the more common mitigations for the more common for abilities of Chelsea. >> The cases are going to walk through pretty slow process of doing waterbodies skin but soup to nuts. Looking down into the domains, a nice those domains, an episode suit, bite-size pieces, if you will, so easy to digest. But it is going to be fun. I'm looking forward to it and hopefully you are too. Thank you for walking us through this, Daniel and thank you for joining us for this over you. For vulnerability, scanning types and concepts seem course