From the course: CertNexus Cybersec First Responder (CFR-410) Cert Prep

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Assessing vulnerabilities

Assessing vulnerabilities

- [Instructor] Hi there and welcome back to the Cyberary CFR-410 preparation course. In this lesson specifically, we'll be looking at how to assess vulnerabilities by reviewing the following topics. We will look at the steps of a vulnerability assessment, how it's comprised of. We'll also compare penetration testing versus a vulnerability assessment. We'll look at tools used in a vulnerability assessment. We'll review network, host, IOT, and application vulnerabilities, as well as VM vulnerabilities. And then lastly, we'll look at some common vulnerability scanning tools. Let's dig right in. Alright, a vulnerability assessment, if you haven't determined it already, is really the evaluation of a system security and its ability to meet specific compliance requirements based on the configuration state of the system. The process of completing a vulnerability assessment can be accomplished in the following steps, and these are displayed on the screen. You need to be able to collect and…

Contents