Threat and Vulnerability Assessment for Enterprises

Video description

Follow the best practices to keep the Enterprises safe and secure from cyber attacks

About This Video

  • Extensive exercises and practice sessions to understand Enterprise-level security issues
  • Robust training to troubleshoot and solve system and network risks in enterprises
  • Intensive topics for professionals to understand enterprise-level threats

In Detail

Technology continues to evolve more rapidly than ever, and the demand for enterprises to continuously update their policies is more vital than ever. No longer are attackers continuing to throw sophisticated attacks that can cripple a business (ex. Ransomware) at the largest companies. Small and medium-sized businesses are no longer safe, and in many cases after a cyber-attack, companies are rarely prepared for future incidents.

In this course, we’ll cover threat and vulnerability management. We introduce you to the core components of comprehensive vulnerability assessment, and provide the hands-on instruction necessary to produce a vigorous defensive strategy from day one.

The course is focused on equipping information security personnel from midsize to large organizations charged with effectively and efficiently securing a few hundred or more systems. By the end of the course, you’ll build a solid base around the entire vulnerability management process including the understanding of vulnerabilities, identifying and ranking the security issues, and recommending solutions to remediate the security issues. This process will also help to prevent security breaches.

Audience

This video course is for ethical hackers, penetration testers, cyber security professionals, network engineers, web security specialists, application security experts and information security professionals, and administrators.

Table of contents

  1. Chapter 1 : Course Introduction
    1. The Course Overview
    2. About the Course
    3. How to Get most out of This course?
    4. Cyber Security Terminologies
  2. Chapter 2 : Lab Setup
    1. Virtual Machine
    2. Windows VM Installation
    3. Kali Linux VM Installation
  3. Chapter 3 : Open Source Intelligence Gathering
    1. OSINT Cycle
    2. Social Media and Geolocation Information
    3. Network, Government, and Business Information
    4. Dark Web Information
  4. Chapter 4 : Network and Website Services Enumeration
    1. Service Enumeration Overview
    2. Nmap Port Scanner
    3. Masscan Enumeration
    4. Web Frontend and Backend Information
    5. Domain information Using Recon-ng
    6. Web Crawling Using HTTrack
  5. Chapter 5 : Web Application Vulnerability Enumeration
    1. Web Application Assessment Overview
    2. Acunetix Web Vulnerability Scanner
    3. OWASP ZAP Proxy
    4. Burp Suite Web Analyzer
    5. Nikto
    6. WPScan for WordPress Scanning
  6. Chapter 6 : Network Vulnerability Enumeration
    1. Network Vulnerability Assessment Overview
    2. Nmap and Zenmap
    3. Tripwire SeureCheq Scanner
    4. Nessus Network Vulnerability Scanner
    5. Summary
  7. Chapter 7 : Discovery of Major Cyber Security Vulnerabilities in Web Application
    1. Web Application VM Lab Setup
    2. SQL Injection Attack
    3. Cross-Site Scripting Attack
    4. Cross-Site Request Forgery Attack
    5. Denial of Service Attack (DOS)
  8. Chapter 8 : Discovery of Other Cyber Security Vulnerabilities in Websites
    1. Buffer Overflow Attack
    2. File Upload Attack
    3. Insecure Cryptographic Storage
    4. Sensitive Data Exposure
    5. Local File Inclusion
    6. Brute Force Attack
  9. Chapter 9 : Discovery of Major Cyber Security Vulnerabilities in Networks
    1. Various Server Vulnerabilities
    2. Protocol Password Attack
    3. Sniffing/Spoofing
    4. Wireless Attack
    5. Flooding Attack
  10. Chapter 10 : Discovery of Other Cyber Security Vulnerabilities in Networks
    1. Various System Vulnerabilities
    2. Phishing Attack
    3. Windows Vulnerabilities
    4. Malware Attack to Breach Security
    5. Browser Vulnerabilities
  11. Chapter 11 : Triage – Security Incidents
    1. Security Triage Overview
    2. Types of Security Incidents
    3. External Media Attack (USB)
    4. Drive by Download Attack
    5. Attrition Attack
    6. Email Attack
  12. Chapter 12 : Remediation of Cyber Attacks on Organizations
    1. 7 Ways to Stop Cyber Security Attacks
    2. Monitor Network Connections
    3. Spoofing Attack Remediation
    4. System Auditing Process
    5. Identify Basic Threats
    6. Deploy a Vulnerability Management System
    7. Course Summary

Product information

  • Title: Threat and Vulnerability Assessment for Enterprises
  • Author(s): Sunil Gupta
  • Release date: February 2019
  • Publisher(s): Packt Publishing
  • ISBN: 9781838559205