From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 24,300 courses taught by industry experts.
Vulnerability management life cycle
From the course: Ethical Hacking: Vulnerability Analysis
Vulnerability management life cycle
- [Instructor] Threats exist, as well as vulnerabilities. You can control the threats, however, you can reduce overall risk by reducing the vulnerabilities. Vulnerability management constantly progresses through a lifecycle that includes baseline, assess vulnerabilities, assess risks, remediate, verify, and monitor. To achieve real value from a vulnerability assessment, begin with an initial study that helps identify the assets and defines the risk and possible business impact. Completing this exercise helps to answer the question, why are we doing this? Because once the organization understands the overall impact of a cyberattack, they'll be more vested in identifying and mitigating vulnerabilities. A baseline is a snapshot of network traffic during a particular window of time. You can take a look at the utilization, the protocols, and latency issues. This baseline should be done over a couple days to learn what normal…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Risks threats and vulnerabilities4m 16s
-
(Locked)
Recognizing common vulnerabilities5m 41s
-
(Locked)
Classifying vulnerabilities5m 3s
-
(Locked)
Assessing vulnerabilities5m 41s
-
(Locked)
Vulnerability management life cycle4m 44s
-
(Locked)
Modeling threats4m 8s
-
(Locked)
Challenge: Threat modeling exercise2m 40s
-
(Locked)
Solution: Threat modeling exercise2m 22s
-
-
-
-
-