Manual Vulnerability Assessment Lab Overview

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Difficulty
Beginner
Video Transcription
00:00
>> Hey, everyone. Welcome back to the course.
00:00
In this particular lab,
00:00
you're going to be using Nmap.
00:00
You're also going to be taking a look at
00:00
the Splunk server and just seeing
00:00
what kind of resources were used on there.
00:00
Then you'll also be taking a look
00:00
at what's been happening on a Windows system,
00:00
so you're going to look at some of
00:00
the logs there as well.
00:00
The tool you're going to be using in
00:00
this particular lab is going to be Nmap, specifically.
00:00
You'll be able to find
00:00
different vulnerabilities in these particular systems.
00:00
As with all of the labs in the series of this course,
00:00
you want to make sure that you're checking
00:00
these boxes as you go through
00:00
the instructions to make sure you get full credit.
00:00
If you haven't done it already,
00:00
be sure to download the step-by-step guide
00:00
that's in the Resources section of the course.
Up Next
Creating Recommendations Based on Vulnerability Assessments Lab Overview
Core Impact Vulnerability Scan Lab Overview
Vulnerability Scanner Set-up and Configuration
Cyberscore
Vulnerability Scanner Set-up and Configuration, Pt. 2
Cyberscore
Vulnerability Identification and Remediation
Cyberscore