Manual Vulnerability Assessment Lab Overview

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
10 hours 25 minutes
Difficulty
Beginner
CEU/CPE
11
Video Transcription
00:00
everyone welcome back to the core. So in this particular lab, you're gonna be using end map. You're also going to be taking a look at the Splunk server and just see what kind of resources were used on there. And then you'll also be taking a look at what's been happening on a window system. So you're gonna look at some of the logs there as well.
00:19
So the tool you're gonna be using in this particular lab is gonna be end map specifically,
00:24
and you'll be able to find different vulnerabilities in this and these particular systems. And as with all of the labs
00:32
in the series of this course, you want to make sure that you're checking these boxes as you go through the instructions to make sure you get full credit. And if you haven't done it already, be sure to download the step by step guide. That's in the resource is section of the course
Up Next
Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By