CEH v12: Vulnerability Assessment Types Models Tools and Reports

placeholder

Performing a vulnerability assessment allows you to locate potential weaknesses in systems networks and channels of communication. This is a vital step in defending systems against attacks.

In this course you;ll learn about the different types of vulnerability assessments. You;ll move on to explore various vulnerability assessment models and tools. Finally you examine important information that should be included in your vulnerability assessment reports.

This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.