CEH v12: Vulnerability Assessment Types Models Tools and Reports
Performing a vulnerability assessment allows you to locate potential weaknesses in systems networks and channels of communication. This is a vital step in defending systems against attacks.
In this course you;ll learn about the different types of vulnerability assessments. You;ll move on to explore various vulnerability assessment models and tools. Finally you examine important information that should be included in your vulnerability assessment reports.
This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.