In order to assess—and ultimately, decrease—an organization’s risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you’re working to strengthen network security at your organization, it’s essential to have a solid grasp of the processes, methodologies, and tools needed to assess vulnerabilities. In this course, security expert Lisa Bock takes a deep dive into the topic of vulnerability scanning, covering what you need to know to find and address weaknesses that attackers might exploit. Lisa goes over the basics of managing organizational risk, discusses vulnerability analysis methodologies, and shows how to work with vulnerability assessment tools, including Nikto and OpenVAS. Plus, she shares tools and strategies for defending the LAN. Lisa also includes challenge chapters to test your knowledge of each section, along with solutions videos for each challenge.
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 11.
- Lisa Bock Author – Ethical Hacking: Penetration Testing
Lisa Bock is an experienced author with a demonstrated history of working in the elearning industry.
Lisa is a security ambassador with a broad range of IT skills and knowledge, including networking, Wireshark, biometrics, and IoT. Lisa is an award-winning speaker, who has presented at several national IT conferences. She holds a master’s degree in computer information systems/information assurance from the University of Maryland University College. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, Pennsylvania) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband, Mike, enjoy bike riding, watching movies, and traveling.