From the course: Ethical Hacking: Vulnerability Analysis

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Selecting a vulnerability assessment tool

Selecting a vulnerability assessment tool

From the course: Ethical Hacking: Vulnerability Analysis

Selecting a vulnerability assessment tool

- [Instructor] It's important to choose the right assessment tool during an ethical hacking exercise. In this segment, we'll review some best practices for selecting the appropriate tool. Scanning the network for vulnerabilities involves locating hosts, identifying listening services, creating a network map, and reporting the results. To ensure the tool you select can effectively assess all components of your environment, complete a thorough evaluation of your hardware, software, and network configurations. Once you know your environment, the next step is to select a vulnerability assessment tool. Let's talk about some best practices to consider. One key concept is it needs to provide enough function for your environment. Try to select a tool that can perform automated scanning and continuously monitor the network to detect new vulnerabilities as they develop. Evaluate the total cost of ownership, including training and licensing fees. Select a tool with the complete, frequently…

Contents