Vulnerabilities Systems Scanning and Exploitation
Vulnerabilities can be defined as a flaw or weakness that can be exploited. One method to identify vulnerabilities is to use a scanner to assess computers networks and applications for known weaknesses. By using a scanner attackers can learn how to best exploit a target system. In this course you will learn how port scanning works and recognize common ports with known protocols. Discover how to perform network discovery using Nmap as well as how to perform vulnerability scanning using Nessus. Discover how to exploit a target system using Nessus and Metasploit and explore how to take over a remote system. Lastly youll also explore vulnerability and system scanning countermeasures and explore countermeasure techniques used to protect against system exploitation. This course was originally created by Global Knowledge (GK).