Creating Recommendations Based on Vulnerability Assessments Lab Overview

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
10 hours 25 minutes
Difficulty
Beginner
CEU/CPE
11
Video Transcription
00:00
everyone, welcome back to the core. So in this particular lab you're going to be using and mapping open Voss again so you'll be identifying different systems with end map. And then you'll be performing a vulnerability scan on those systems using open Voss, and you'll also be doing some reporting at the end of the lab
00:16
again. As always on these particular labs and this course, you just want to make sure you're checking the box on the right side here as you go through the instructions. So that way, you get full credit for the lab once your complete
00:29
and if you haven't already done a little two step by step guides, be sure to do that from the resource section of the course, or you can also just follow along with the instructions on the right side of the lab itself.
Up Next
Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By