From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Selecting a vulnerability assessment tool
From the course: Ethical Hacking: Vulnerability Analysis
Selecting a vulnerability assessment tool
- [Instructor] It's important to choose the right assessment tool during an ethical hacking exercise. In this segment, we'll review some best practices for selecting the appropriate tool. Scanning the network for vulnerabilities involves locating hosts, identifying listening services, creating a network map, and reporting the results. To ensure the tool you select can effectively assess all components of your environment, complete a thorough evaluation of your hardware, software, and network configurations. Once you know your environment, the next step is to select a vulnerability assessment tool. Let's talk about some best practices to consider. One key concept is it needs to provide enough function for your environment. Try to select a tool that can perform automated scanning and continuously monitor the network to detect new vulnerabilities as they develop. Evaluate the total cost of ownership, including training and licensing fees. Select a tool with the complete, frequently…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.