5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Certification     EC-Council     Certified Ethical Hacker (CEH)     Certified Ethical Hacker (CEH) v11

Performing a vulnerability assessment allows you to locate potential weaknesses in systems, networks, and channels of communication. This is a vital step in defending systems against attacks. In this course, you'll learn about the different types of vulnerability assessments. You'll move on to explore various vulnerability assessment models and tools. Finally, you examine important information that should be included in your vulnerability assessment reports. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEH v11: Vulnerability Assessment Types, Models, Tools & Reports

  • identify the type of vulnerability assessment that involves probing a system for vulnerabilities
  • recognize the type of security controls that should be used when accessing data
  • recognize the type of vulnerability assessment that involves using a sniffer to identify sensitive traffic
  • identify common vulnerability scanners and tools
  • identify the vulnerability assessment model that involves you running a vulnerability scanner
  • recognize the different vulnerability assessment models
  • identify high level severity items in a vulnerability report
  • recognize how to add a list of targets to a vulnerability scanner
  • recognize the elements of a vulnerability report