CEH v11: Vulnerability Assessment Types Models Tools & Reports

placeholder

Performing a vulnerability assessment allows you to locate potential weaknesses in systems networks and channels of communication. This is a vital step in defending systems against attacks. In this course you;ll learn about the different types of vulnerability assessments. You;ll move on to explore various vulnerability assessment models and tools. Finally you examine important information that should be included in your vulnerability assessment reports. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.