The applications that we use across our networks can hide vulnerabilities that haven’t yet been discovered by the general public. In this video, you’ll learn about zero-day attacks that take advantage of these vulnerabilities.
A penetration test is an invasive attack of your operating systems and applications. In this video, you’ll learn how a potential vulnerability can be exploited with penetration testing tools.
A good vulnerability scan can give you the information you need to make your network resilient to attacks. In this video, you’ll learn how vulnerability scans work and see the results of a vulnerability scan on my network.
Patching and updating your computer components can be a simple process or one that can bring significant challenges. In this video, you’ll learn about updating your operating system, firmware, drivers, and much more.
It’s important to accurately categorize security assessments. In this video, you’ll learn the differences between a security risk, security vulnerability and security threat.
How many vulnerabilities do your network devices have? In this video, you’ll learn how to use a vulnerability scanner to find the susceptible areas in your network.