Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:00
Welcome the CyberRays video, Siri's in the Company of Security Plus 5 +01 Certification and Exam.
00:07
I'm your instructor, Rahm Warner.
00:10
This video is on section 1.5 explained Vulnerability Scanning concepts, which is part of domain one threat attacks and vulnerabilities.
00:21
In this video, we'll talk about the following concepts associated with vulnerability scanning.
00:27
We'll dress the process for vulnerability. Scanning passively testing security controls
00:32
identifying the vulnerability. Identify the security controls that are lacking and then common Miss configurations.
00:40
There are also different types of vulnerability scans You need to be familiar with intrusive versus non intrusive credentials versus non credentialed and what is a false positive.
00:52
In the previous video on section 1.4 on penetration testing, I explained the difference between penetration, testing, vulnerability, scanning and risk assessments.
01:02
Police refer to that video for information on those topics. Toe. Understand the similarities and differences between them.
01:11
I'll begin this video by describing in defining vulnerability and vulnerability. Scanning
01:18
vulnerability is a weakness or a flaw in the system that can leave it open toe attack. It may also refer to any type of weakness in the computer system itself and a set of procedures and application. Anything that leaves information security exposed to a threat
01:34
of vulnerability scan is an inspection of the potential points of exploit on a computer and network toe. Identify security holes.
01:44
It detects and classifies system weaknesses and computers,
01:48
networks, applications and communications equipment and predicts the effectiveness of countermeasures.
01:56
Be familiar with these definitions as we walk through the steps and attributes in this video.
02:02
The goal of a vulnerability scan or vulnerability assessment. Mr. Identify System Network or application Weaknesses. Identify unpatched or not updated systems or applications. Common Miss configuration. So systems that are not complying with a standard baseline
02:20
or other types of lax of of security controls
02:25
on your screen is a process for conducting a vulnerability scan or vulnerability assessment.
02:31
Start by passively testing security controls, not exploiting any vulnerability. It's a passive test, which I'll explain in a moment.
02:42
Step two. Identify the vulnerability system flawed or unpatched code. This could be done through an automated system or through manual means should also identify lack of security control so Miss configurations are not setting appropriate standards or policies on the computer system.
03:00
Lastly, is identifying common miss configurations by reviewing system settings,
03:06
policies or rule sets.
03:09
There are different types of vulnerability scans and vulnerability assessments.
03:14
First is intrusive versus non intrusive.
03:16
I also discussed this when talking about penetration. Testing
03:21
should also refer to passive versus active reconnaissance from that video.
03:25
An intrusive scan directly engaging the target system to identify weaknesses that could be used to launch an attack actually interfacing with the system that you might be attacking.
03:38
A non intrusive vulnerability assessment gains vulnerability information about the targeted computers and networks without actively engaging with the systems.
03:49
A good example is cuales es SL lapse, finding information about a website and their certificates using an Internet service.
03:58
Another type of vulnerability assessment is credentialed versus non credentialed.
04:03
Do you have access credentials, a user, a D and password or not?
04:10
Whether or not authenticated credentials are used in scanning credentialed has lesser risks. So we'll use credentials, user ID's and passwords to run my vulnerability test, which is kind of like insider knowledge. It's a type of white box tastic, as opposed to non credentialed, more like black box tastic.
04:30
Black Box is a little more realistic compared to white box, so non credentialed, more realistic versus credentialed.
04:38
A false positive occurs when a scan mistakenly identifies a vulnerability
04:44
when it's not really there.
04:46
Beware false positives. And this is why you need to scrub your results of your vulnerability scans to look for false positives because they might be indicative of a security problem. 11 does not really exist
05:00
in this video.
05:02
I discussed Section one Die five about vulnerability scanning concepts. Let's practice on a simple quiz question.
05:11
Question.
05:13
You've been asked to conduct an internal vulnerability assessment for your organization.
05:17
Which of the following steps should you avoid in determining system or network weaknesses to minimize risk?
05:25
The answer is B
05:27
Exploiting unpatched applications.
05:30
Exploiting is a part of penetration testing
05:33
and not a part of vulnerability assessments.
05:36
This concludes the video for section 1.5, where I explained vulnerability scanning concept.
05:42
Refer to your study material for more information on this topic.

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor