From the course: Protecting Your Network with Open-Source Software
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
What is a network vulnerability assessment?
From the course: Protecting Your Network with Open-Source Software
What is a network vulnerability assessment?
- Network vulnerability assessment is a way to discover potential security weaknesses in a computer network. There are different types of network vulnerabilities. One is vulnerable configurations such as open ports. Another type is known software vulnerabilities for both operating systems and applications. The third type is vulnerabilities associated with compliance to policies and standards. This third one is more human factor-oriented rather than technical. For more technical vulnerabilities, especially those related to security misconfigurations, please check out this national vulnerability database by NIST or National Institute of Standards and Technology. A lot of vulnerability assessment tools used that common configuration enumeration, or CCE provided by NIST. The process of removing security vulnerabilities as much as possible is referred to as system or network hardening. The hardening can be done technically by installing patches and fixing configurations, or it could be…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
(Locked)
What is an IDS?3m 36s
-
(Locked)
Introducing Snort3m 25s
-
(Locked)
Snort as a packet sniffer4m 13s
-
(Locked)
Snort as an IDS: Establishing rules4m 34s
-
(Locked)
Snort as an IDS: Detecting pings2m 36s
-
(Locked)
What is a network vulnerability assessment?3m 12s
-
(Locked)
Nessus1m 23s
-
(Locked)
Network scanning with Nessus2m 30s
-
(Locked)
-
-