Vulnerability Scanning Package

Provided by

Enquire about this course

About the course

Vulnerability Scanning Package
This package includes access to all CYRIN Vulnerability Scanning category labs for a period of one year. Access includes CYRIN's existing catalog of Vulnerability Scanning lab courses as well as newly-created Vulnerability Scanning labs during the access period.

As an IT administrator, it’s important to be aware of the tools potential adversaries are likely to use against your networks and your applications.

Not only will this help you prepare for attacks and better secure your systems, it can also identify weaknesses, misconfigurations, or unknown services on your network. And as new vulnerabilities are discovered every day, routine scanning of your network and its services lets you see whether any newly-discovered vulnerabilities apply in your configuration. Labs in this category focus on systems-level scanning and exploitation.

For vulnerabilities specific to web-based applications, also consider labs in our Web Application Security Analysis category.

Questions about which lab is right for you? Contact  us via the form below.
  
Introduction to Metasploit
Students will gain experience with the widely-used open source Metasploit® framework and related tools for exploiting vulnerable software and insecure system configurations. The exercise leads students through the entire process, from scanning the network to getting remote shells and accessing sensitive information. By seeing the tools available to potential attackers, students will gain a greater appreciation for the need to keep software up-to-date and securely configured.

Prerequisites

  • Familiarity with the Unix/Linux command line
  • Basic networking concepts (TCP/IP, DNS, etc.)

Expected Duration
1 hour, self-paced. Pause and continue at any time.

1 CPE awarded on successful completion.

The course is also available as part of the CYRIN Vulnerability Scanning Package as well as the CYRIN Cyber Range All Access Package.


Vulnerability Scanning with OpenVAS
Students will use the free OpenVAS web tool suite to identify vulnerabilities in services available on an unknown network. The network will include several targets with known-vulnerable software versions and/or configurations.

Prerequisites

  • Familiarity with the Unix/Linux command line
  • Basic operating system security concepts
  • Basic networking concepts (TCP/IP, DNS, etc.)

Expected Duration
2 hours, self-paced. Pause and continue at any time.

2 CPEs awarded on successful completion.

This lab is also available as part of the CYRIN Vulnerability Scanning Package as well as the CYRIN Cyber Range All Access Package.


Automating Security Analysis with SPARTA
Students will build on the results of labs in the Web Application Security Analysis and Network Monitoring categories by using the SPARTA network infrastructure penetration testing tool, a graphical application that automates many common vulnerability assessment tasks. Students will use SPARTA within a graphical Kali Linux environment, scanning multiple unknown target systems and exploring found weaknesses.

Prerequisites

  • Familiarity with the Unix/Linux command line
  • Basic web application knowledge (HTTP, URL parameters, etc.)
  • Basic networking concepts (TCP/IP, DNS, etc.)

Expected Duration
2 hours, self-paced. Pause and continue at any time.

2 CPEs awarded on successful completion.

This lab is also available as part of the CYRIN Vulnerability Scanning Package as well as the CYRIN Cyber Range All Access Package.

Enquire

Start date Location / delivery
No fixed date Online Book now

Related article

CYBER PULSE: EDITION 133 | 14 OCTOBER 2020 Read the latest edition of Cyber Pulse: Beware of scams and lures around Amazon Prime Day 2020, Apple bug