Time
10 hours 25 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:00
Hey, everyone, welcome back to the course and congratulations. This is the last hands on lab of this course on And then you move into the next module where we just kind of wrap up the course. So in this particular labrie gonna be using court impact again. So the three main tools we've used throughout this r N map open Vossen core impact to run our vulnerability Skins.
00:20
This is a shorter lab. Shouldn't take you too long to do
00:23
except for the reporting part. Might take a little while, but basically just gonna be running some scans with court impact now, as always with all the other labs which you should have the hands on practice by No with make sure that you're checking these boxes. You can actually get full credit for the lab once you complete it at the end.
00:39
In the next video, we're gonna go ahead and go through
00:42
the wrap up of the course. And then, as I mentioned at the very end of the course, there's an assessment that you want to take

Up Next

Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor