5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Certifications     EC Council     Certified Ethical hacker     Certified Ethical Hacker (CEH) v11

One of the main job duties of many ethical hackers is performing vulnerability assessments. In this course, you'll explore the basic concepts of vulnerability assessments, as well as tools and resources commonly used when performing one. You'll examine the vulnerability management life cycle and common activities performed during it. Finally, you'll learn about the various vulnerability types you may discover during an assessment. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEH v11: Vulnerability Assessment, Management & Classification

  • describe the rating and score metrics used by the Common Vulnerability and Exposures (CVE) scoring system
  • recognize tools and resources commonly used when analyzing a vulnerability assessment report
  • describe the six activities of the vulnerability management life cycle
  • describe the vulnerability phases in relation to the vulnerability assessment life cycle
  • recognize the activities performed during the assessment phases
  • identify the type of vulnerability that could be discovered during an assessment
  • match the different vulnerability types that could be found during an assessment
  • recognize the different vulnerability types and how they may be identified during an assessment