Manual Vulnerability Assessment Lab Overview

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

10 hours 25 minutes
Video Transcription
everyone welcome back to the core. So in this particular lab, you're gonna be using end map. You're also going to be taking a look at the Splunk server and just see what kind of resources were used on there. And then you'll also be taking a look at what's been happening on a window system. So you're gonna look at some of the logs there as well.
So the tool you're gonna be using in this particular lab is gonna be end map specifically,
and you'll be able to find different vulnerabilities in this and these particular systems. And as with all of the labs
in the series of this course, you want to make sure that you're checking these boxes as you go through the instructions to make sure you get full credit. And if you haven't done it already, be sure to download the step by step guide. That's in the resource is section of the course
Up Next