O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Threat and Vulnerability Assessment for Enterprises

Video Description

Follow the best practices to keep the Enterprises safe and secure from cyber attacks

About This Video

  • Extensive exercises and practice sessions to understand Enterprise-level security issues
  • Robust training to troubleshoot and solve system and network risks in enterprises
  • Intensive topics for professionals to understand enterprise-level threats

In Detail

Technology continues to evolve more rapidly than ever, and the demand for enterprises to continuously update their policies is more vital than ever. No longer are attackers continuing to throw sophisticated attacks that can cripple a business (ex. Ransomware) at the largest companies. Small and medium-sized businesses are no longer safe, and in many cases after a cyber-attack, companies are rarely prepared for future incidents.

In this course, we’ll cover threat and vulnerability management. We introduce you to the core components of comprehensive vulnerability assessment, and provide the hands-on instruction necessary to produce a vigorous defensive strategy from day one.

The course is focused on equipping information security personnel from midsize to large organizations charged with effectively and efficiently securing a few hundred or more systems. By the end of the course, you’ll build a solid base around the entire vulnerability management process including the understanding of vulnerabilities, identifying and ranking the security issues, and recommending solutions to remediate the security issues. This process will also help to prevent security breaches.

Downloading the example code for this course: You can download the example code files for all Packt video courses you have purchased from your account at http://www.PacktPub.com. If you purchased this course elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

Table of Contents

  1. Chapter 1 : Course Introduction
    1. The Course Overview 00:02:16
    2. About the Course 00:01:04
    3. How to Get most out of This course? 00:01:00
    4. Cyber Security Terminologies 00:01:39
  2. Chapter 2 : Lab Setup
    1. Virtual Machine 00:04:26
    2. Windows VM Installation 00:06:28
    3. Kali Linux VM Installation 00:04:46
  3. Chapter 3 : Open Source Intelligence Gathering
    1. OSINT Cycle 00:02:28
    2. Social Media and Geolocation Information 00:04:13
    3. Network, Government, and Business Information 00:01:13
    4. Dark Web Information 00:03:55
  4. Chapter 4 : Network and Website Services Enumeration
    1. Service Enumeration Overview 00:01:34
    2. Nmap Port Scanner 00:06:05
    3. Masscan Enumeration 00:06:03
    4. Web Frontend and Backend Information 00:04:48
    5. Domain information Using Recon-ng 00:08:51
    6. Web Crawling Using HTTrack 00:06:17
  5. Chapter 5 : Web Application Vulnerability Enumeration
    1. Web Application Assessment Overview 00:01:13
    2. Acunetix Web Vulnerability Scanner 00:09:58
    3. OWASP ZAP Proxy 00:06:46
    4. Burp Suite Web Analyzer 00:06:19
    5. Nikto 00:05:42
    6. WPScan for WordPress Scanning 00:09:09
  6. Chapter 6 : Network Vulnerability Enumeration
    1. Network Vulnerability Assessment Overview 00:01:35
    2. Nmap and Zenmap 00:13:10
    3. Tripwire SeureCheq Scanner 00:07:12
    4. Nessus Network Vulnerability Scanner 00:12:01
    5. Summary 00:01:08
  7. Chapter 7 : Discovery of Major Cyber Security Vulnerabilities in Web Application
    1. Web Application VM Lab Setup 00:06:55
    2. SQL Injection Attack 00:08:50
    3. Cross-Site Scripting Attack 00:08:43
    4. Cross-Site Request Forgery Attack 00:10:08
    5. Denial of Service Attack (DOS) 00:05:49
  8. Chapter 8 : Discovery of Other Cyber Security Vulnerabilities in Websites
    1. Buffer Overflow Attack 00:04:52
    2. File Upload Attack 00:06:47
    3. Insecure Cryptographic Storage 00:04:14
    4. Sensitive Data Exposure 00:04:42
    5. Local File Inclusion 00:06:59
    6. Brute Force Attack 00:06:55
  9. Chapter 9 : Discovery of Major Cyber Security Vulnerabilities in Networks
    1. Various Server Vulnerabilities 00:01:44
    2. Protocol Password Attack 00:08:41
    3. Sniffing/Spoofing 00:08:37
    4. Wireless Attack 00:09:07
    5. Flooding Attack 00:10:17
  10. Chapter 10 : Discovery of Other Cyber Security Vulnerabilities in Networks
    1. Various System Vulnerabilities 00:01:49
    2. Phishing Attack 00:09:59
    3. Windows Vulnerabilities 00:08:28
    4. Malware Attack to Breach Security 00:10:46
    5. Browser Vulnerabilities 00:10:31
  11. Chapter 11 : Triage – Security Incidents
    1. Security Triage Overview 00:01:16
    2. Types of Security Incidents 00:02:17
    3. External Media Attack (USB) 00:06:26
    4. Drive by Download Attack 00:03:24
    5. Attrition Attack 00:03:11
    6. Email Attack 00:03:59
  12. Chapter 12 : Remediation of Cyber Attacks on Organizations
    1. 7 Ways to Stop Cyber Security Attacks 00:02:58
    2. Monitor Network Connections 00:05:49
    3. Spoofing Attack Remediation 00:04:01
    4. System Auditing Process 00:05:48
    5. Identify Basic Threats 00:03:56
    6. Deploy a Vulnerability Management System 00:01:34
    7. Course Summary 00:01:35