Network Scanning and Vulnerability Scanning

Network Scanning and Vulnerability Scanning

Computer Security Fundamentals

by Chuck Easttom

Chapter 11 Network Scanning and Vulnerability Scanning

*

© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

Chapter 11 Objectives

Understand how to secure a system
Probe a system for vulnerabilities
Use Vulnerability vulnerability scanning tools
Evaluate potential security consultants
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

Understand and be able to conduct basic system reconnaissance.

Describe and use several port scanners.

Understand how to derive useful information about a Web site from internic or the Netcraft Web site.

Know how to locate useful information about a system or organization from Internet newsgroup postings.

Understand the use of vulnerability scanners.

Use port monitoring utilities.

© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

Introduction

Secure the system.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

The goals of the hacker and the network administrator have a great deal in common.

© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

Basics of Security

Ports
Protect
Policies
Probe
Physical
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

The goals of the hacker and the network administrator have a great deal in common.

© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

MBSA

Microsoft Baseline Security Analyzer
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

The goals of the hacker and the network administrator have a great deal in common.

© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

Nessus

Popular Vulnerability Scanner
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

The goals of the hacker and the network administrator have a great deal in common.

© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

Getting Professional Help

Certification
Education
Experience
Background Checks
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

The goals of the hacker and the network administrator have a great deal in common.

Certifications

CEH
CISSP
Security+
Vendor-specific (Microsoft, Cisco, and so on)
GAIC
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

Education

Computer Science
Engineering
Computer Information Systems
Security Degrees
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

Background and Experience

Prior Security Experience
Criminal Background Check
Credit Check
References Check
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

Summary

Information
The more information you have about the vulnerabilities and weaknesses of your system, the better prepared you are to defend it.
The more information the hacker has about your system’s vulnerabilities and weaknesses, the sooner it will be violated.
The tools in this chapter are for the network and security administrator and are to be used for legal, not illegal, purposes.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

*

*

*

Understand and be able to conduct basic system reconnaissance.

Describe and use several port scanners.

Understand how to derive useful information about a Web site from internic or the Netcraft Web site.

Know how to locate useful information about a system or organization from Internet newsgroup postings.

Understand the use of vulnerability scanners.

Use port monitoring utilities.

*

The goals of the hacker and the network administrator have a great deal in common.

*

The goals of the hacker and the network administrator have a great deal in common.

*

The goals of the hacker and the network administrator have a great deal in common.

*

The goals of the hacker and the network administrator have a great deal in common.

*

The goals of the hacker and the network administrator have a great deal in common.

*

The post Network Scanning and Vulnerability Scanning appeared first on Lion Essays.

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”


Network Scanning and Vulnerability Scanning was first posted on April 20, 2019 at 6:32 pm.
©2019 "Lion Essays". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at support@Lion Essays.com

"Get 15% discount on your first 3 orders with us"
Use the following coupon
FIRST15

Order Now