10 hours 25 minutes

Video Transcription

everyone welcome back to the core. So in this particular lab, you're gonna be using end map. You're also going to be taking a look at the Splunk server and just see what kind of resources were used on there. And then you'll also be taking a look at what's been happening on a window system. So you're gonna look at some of the logs there as well.
So the tool you're gonna be using in this particular lab is gonna be end map specifically,
and you'll be able to find different vulnerabilities in this and these particular systems. And as with all of the labs
in the series of this course, you want to make sure that you're checking these boxes as you go through the instructions to make sure you get full credit. And if you haven't done it already, be sure to download the step by step guide. That's in the resource is section of the course

Up Next

Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor