SlideShare a Scribd company logo
1 of 27
Download to read offline
ABOUT NETCOM LEARNING
NetCom Learning is an award-winning
global leader in managed learning
services,training and talentdevelopment.
Founded
Headquarters
Delivery Capability
: 1998
: New Y
orkCity
: Worldwide
CEO : Russel Sarder
100K+
Professionals
trained
14K+
C
orporate
clients
3500
IT
,Business&
Soft Skilscourses
96%
Of customers
recommend usto others
8.6/9
Instructor
evaluations
20+
Leadingvendors
recognitions
Microsoft’s
Worldwide training
partner of the year
80%
Trained ofthe
Fortune 100
T
op20
ITTraining
Company
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
© 1998-2022 NetCom Learning
CLICK HERE TO WATCH
Access the Recorded Session here!
© Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning (888) 563-8266 | comptia@netcomlearning.com
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com
| | |
AGENDA
Importance of threat data and intelligence
Introduction to vulnerability management activities
Common vulnerability assessment tools
Implementation of security measures
Q&A
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com
| | |
WHY VULNERABILITY ASSESSMENT?
• A vulnerability assessment is designed to identify unpatched and exploitable vulnerabilities,
giving the organization the opportunity to remediate these deficiencies before they are
discovered by a bad actor.
• The evolving tools, tactics and procedures used by cybercriminals to breach networks means that
it's important to regularly test your organization's cyber security.
• Vulnerability assessment helps to protect your organization by providing visibility of security
weaknesses and guidance to address them.
• It helps with greater security insights, ongoing risk management, and the ability to meet
regulatory obligations.
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com
| | |
• Vulnerability management is different from vulnerability assessment.
• Vulnerability management is an ongoing process, while a vulnerability assessment is a
one-time evaluation of a host or network.
• Vulnerability assessment is part of the vulnerability management process, but not vice
versa.
VULNERABILITY ASSESSMENT VS. VULNERABILITY MGMT.
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com
| | |
• Collection and analysis of information about threats and
adversaries- drawing patterns- provide an ability to make
decisions – for preparedness, prevention, response- against
various cyber attacks.
• Identify and mitigate various business risks- Implementing
various advanced and proactive defense strategies.
• CTI is Collecting information about presumed attacks to
understand their motive behind attacks- the approach they
must follow- analyze this information for securing IT
infrastructure of an organization in advance.
CYBER THREAT INTELLIGENCE
Information
Meaningful
Intelligence
Analyzed, interpreted,
In-depth knowledge
Supports Decision making &
Response Actions
Data
Raw, huge, no context, un-processed
(Structured/
Unstructured)
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com
| | |
IMPORTANCE OF THREAT DATA AND INTELLIGENCE
• Threat intelligence is data that is collected, processed, and analyzed to understand a threat actor’s
motives, targets, and attack behaviors.
• Threat intelligence enables us to make faster, more informed, data-backed security decisions and
change their behavior from reactive to proactive in the fight against threat actors.
• Threat intelligence is evidence-based about existing or emerging menaces or hazards to assets.
• Threat intelligence benefits organizations of all shapes and sizes by helping process threat data to
better understand their attackers, respond faster to incidents, and proactively get ahead of a
threat actor’s next move.
• Ensure you stay up to date with the often-overwhelming volume of threats, including methods,
vulnerabilities, targets and bad actors.
• Reducing risk
• Preventing financial loss
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com
| | |
BENEFITS OF THREAT INTELLIGENCE
• Providing greater insights into cyber threats
• Preventing data loss- by identifying cause of data leakage
• Guiding in incident response
• Conducting data analysis- to identify exploitable data
• Helps in conducting threat analysis- detecting advanced
threats
• Helps in sharing threat information- spread awareness
• Identifying IOCs
• Discovering tactics, techniques and procedures (TTPs) for
possible attacks
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com
| | |
VULNERABILITY RESEARCH VS. VULNERABILITY ASSESSMENT
Vulnerability Research
• Discovering vulnerabilities and design flaws
• Vulnerabilities are classified based on
• Severity Level- Low, medium, high
• Exploit Range- Local or Remote
• An administrator needs vulnerability research
• Gather information about security trends, threats, attacks
• Gather information that helps to prevent security problems
• Find weakness and alert concerned person before a network attack
• To know how to recover from a network attack
Vulnerability Assessment
• Examination of the ability of a system or application to withstand assault
• Vulnerability assessment may be used to
• Identify weakness that could be exploited
• Predict effectiveness of additional security measures in protecting information from attacks
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com
| | |
VULNERABILITY SCORING SYSTEMS AND DATABASES
• Common Vulnerability Scoring System (CVSS)
• CVSS provides an open framework for communicating the characteristics and impacts of IT vulnerabilities
• Its quantitative model ensures repeatable accurate measurement, while enabling users to view the
underlying vulnerability characteristics used to generate the scores.
• Common Vulnerabilities and Exposures (CVE)
• A publicly available and free-to-use list or dictionary of standardized identifiers for common software
vulnerabilities and exposures
• National Vulnerability Database (NVD)
• A U.S. government repository of standards-based vulnerability management data represented using the
Security Content Automation Protocol (SCAP)
• These data enable the automation of vulnerability management, security measurement, and compliance
• The NVD includes databases of security checklist references, security-related software flaws,
misconfigurations, product names, and impact metrics
• Common Weakness Enumeration (CWE)
• A category system for software vulnerabilities and weaknesses
• It is sponsored by the National Cybersecurity FFRDC, which is owned by The MITRE Corporation, with
support from US-CERT and the National Cyber Security Division of the U.S. Department of Homeland
Security
• It has over 600 categories of weaknesses, which enable CWE to be effectively employed by the
community as a baseline for weakness identification, mitigation, and prevention efforts.
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com
| | |
VULNERABILITY CLASSIFICATION
• Misconfigurations
• Default Installations
• Buffer overflows
• Unpatched Servers
• Design Flaws
• Operating system flaws
• Application Flaws
• Open services
• Default passwords
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com
| | |
TYPES OF VULNERABILITY ASSESSMENT
• Active Assessment
• Uses a network scanner to find hosts, services, and vulnerabilities
• Passive Assessment
• Used to sniff the network traffic to discover present active systems, network services, applications, and
vulnerabilities present
• External Assessment
• Assesses the network from a hacker's perspective to discover exploits and vulnerabilities that are
accessible to the outside world
• Internal Assessment
• Scans the internal infrastructure to discover exploits and vulnerabilities
• Host-based Assessment
• Conducts a configuration-level check to identify system configurations, user directories, file systems,
registry settings, etc., to evaluate the possibility of compromise
• Network-based Assessment
• Determines possible network security attacks that may occur on the organization’s system
• Application Assessment
• Tests and analyzes all elements of the web infrastructure for any misconfiguration, outdated content, or
known vulnerabilities
• Database Assessment
• Focuses on testing databases, such as MYSQL, MSSQL, ORACLE, POSTGRESQL,etc., for the presence of
data exposure or injection type vulnerabilities
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com
| | |
TYPES OF VULNERABILITY ASSESSMENT
• Wireless Network Assessment
• Determines the vulnerabilities in the organization’s wireless networks
• Distributed Assessment
• Assesses the distributed organization assets, such as client and server applications, simultaneously
through appropriate synchronization techniques
• Credentialed Assessment
• Assesses the network by obtaining the credentials of all machines present in the network
• Non-Credentialed Assessment
• Assesses the network without acquiring any credentials of the assets present in the enterprise network
• Manual Assessment
• In this type of assessment, the ethical hacker manually assesses the vulnerabilities, vulnerability ranking,
vulnerability score, etc.
• Automated Assessment
• In this type of assessment, the ethical hacker employs various vulnerability assessment tools, such as
Nessus, Qualys, GFI LanGuard, etc.
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com
| | |
VULNERABILITY ASSESSMENT TOOLS
• Qualys Vulnerability Management
• A cloud-based service that offers immediate global visibility into IT system areas that might be
vulnerable to the latest Internet threats and how to protect them
• Aids in the continuous identification of threats and monitoring of unexpected changes in a
network before they become breaches
• Nessus Professional
• An assessment solution for identifying the vulnerabilities, configuration issues, and malware.
• GFI LanGuard
• Scans, detects, assesses, and rectifies security vulnerabilities in a network and connected
devices
• OpenVAS
• A framework of several services and tools offering a comprehensive and powerful vulnerability
scanning and vulnerability management solution
• Nikto
• A web server assessment tool that examines a web server to discover potential problems and
security vulnerabilities
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com
| | |
VULNERABILITY ASSESSMENT TOOLS
• Qualys FreeScan https://freescan.qualys.com
• Acunetix Web Vulnerability Scanner https://www.acunetix.com
• Microsoft Baseline Security Analyzer (MBSA) https://www.microsoft.com
• beSECURE (AVDS) https://www.beyondsecurity.com
• Nexpose https://www.rapid7.com
• Core Impact Pro https://www.coresecurity.com
• N-Stalker Web Application Security Scanner https://www.nstalker.com
• SAINT https://www.saintcorporation.com
• ManageEngine Vulnerability Manager Plus https://www.manageengine.com
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com
| | |
CHOOSING A VULNERABILITY ASSESSMENT TOOL
Vulnerability assessment tools are used to test a host or application for vulnerabilities
Choose the tools that best satisfy the following requirements:
• Can test from dozens to 30,000 different vulnerabilities, depending on the product
• Contains several hundred different attack signatures
• Matches your environment and expertise
• Has accurate network, application mapping, and penetration tests
• Has several regularly updated vulnerability scripts for the platforms that you are scanning
• Generates reports
• Checks different levels of penetration in order to prevent lockups
• Ensure that it does not damage your network or system while running tools
• Understand the functionality, and decide on the information that needs to be collected before
beginning
• Decide the source location of the scan, taking into consideration the information that needs to
be collected
• Enable logging every time a computer is scanned
• Users should scan their systems frequently for vulnerabilities
© 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com
| | |
IMPLEMENTATION OF SECURITY MEASURES
• Develop a cybersecurity strategy for your organization, A cybersecurity strategy is a high-level plan
for how your organization will secure its assets during the next three to five years.
• Create a detailed cybersecurity policy, A cybersecurity policy sets the standards of behavior for
activities such as the encryption of email attachments and restrictions on the use of social media.
• Backup and encrypt your data.
• Use multi-factor authentication.
• Create secure passwords and keep them safe.
• Use the principle of least privilege.
• Know who is accessing your data.
• Educate and train your employees.
• Keep all software and apps up to date.
• Don’t underestimate hackers.
RECOMMENDED COURSES
NetCom Learning offers a comprehensive portfolio for Security
» EC-COUNCIL CHFI: COMPUTER HACKING FORENSIC INVESTIGATOR V10 – Class Scheduled on Oct 17
» COMPTIA PENTEST+ CERTIFICATION PREP (EXAM PT0-002) - Class Scheduled on Dec 12
» COMPTIA SECURITY+ CERTIFICATION PREP (EXAM SY0-601) - Class Scheduled on Oct 24
You can also access the below Marketing Assets
» Free 1hr Training - Getting started with 5 fundamental domains of cybersecurity governance
» Free On-Demand Training - Learn to Defend Against Multi-Stage Network Breaches in 40 Minutes
» Blog - What’s New in EC-Council CEH v12: Features & Updates
Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning (888) 563-8266 | comptia@netcomlearning.com
OTHER MARKETING ASSETS
COURSES & CERTIFICATIONS
Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning
OUR FREE VIRTUAL EVENTS BLOGS SAVINGS PROGRAMS & PROMOS
(888) 563-8266 | comptia@netcomlearning.com
Stay Digital Safe - Assess and Upskill your team against cyber threats now !
NetCom Learning's end-user Cybersecurity Awareness Training & Phishing Simulation Solution offers phishing simulations on email,
voice, and text to organizations, and is bundled with 90+ interactive security awareness video courses for the end-users.
Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning (888) 563-8266 | comptia@netcomlearning.com
Request a Demo
The number of cyberattacks across the globe is increasing with time. Can you afford to compromise your organization’s security?
Equip your workforce with advanced ethical hacking skills with all new EC-Council C|EH® v12 and improve your
organizational security!
Upskill Now
Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning (888) 563-8266 | comptia@netcomlearning.com
Learning Passport
Flexible Team Training Package
Specifically designed to be customized for the number of learners you
plan to train on top-notch technology providers – including Microsoft,
AWS, Cisco, CompTIA, Adobe, Autodesk, PMI, EC-Council, and more.
Redeemable over 4,000+ official courses
Flexible fund validity of 12 months
Contact Us Now To Schedule your appointment with our learning consultants.
Toll-free Phone: 1-888-563-8266 | Email: info@netcomlearning.com
Learn More
Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning (888) 563-8266 | comptia@netcomlearning.com
NetCom
Individual Learner Subscription
Get 24/7 access to unlimited virtual instructor-led and self-paced IT and
business training for 12 months. NetCom+ includes over 250 e-Learning
and 140 virtual instructor led courses across various domains.
$2,999 per learner per year
* Additional discounts available for enterprises
+
Learn More
Interested in training? Contact us! | www.netcomlearning.com |
© 1998-2022 NetCom Learning (888) 563-8266 | comptia@netcomlearning.com
FOLLOW US ON
LinkedIn T
witter YouTube
Instagram
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
© 1998-2022 NetCom Learning
A BOOK FROM
RUSSELL SARDER
CEO - NETCOM LEARNING
A framework to build a smarter
workforce, adapt to change and drive
growth.
Download
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
© 1998-2022 NetCom Learning
Thankyou
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
© 1998-2022 NetCom Learning

More Related Content

Similar to Best Practices to Cybersecurity Vulnerability Management,.pdf

5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management ProgramTripwire
 
Digitalstakeout Scout Overview
Digitalstakeout Scout OverviewDigitalstakeout Scout Overview
Digitalstakeout Scout OverviewDigitalStakeout
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Resolver Inc.
 
Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking: Banishing FUD With Structure and NumbersApplication Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking: Banishing FUD With Structure and NumbersDenim Group
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats Jim Kaplan CIA CFE
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectATMOSPHERE .
 
Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies Harry McLaren
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpointrandalje86
 
DHS Cybersecurity Webinar
DHS Cybersecurity Webinar DHS Cybersecurity Webinar
DHS Cybersecurity Webinar businessforward
 

Similar to Best Practices to Cybersecurity Vulnerability Management,.pdf (20)

5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program
 
Digitalstakeout Scout Overview
Digitalstakeout Scout OverviewDigitalstakeout Scout Overview
Digitalstakeout Scout Overview
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security
 
Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking: Banishing FUD With Structure and NumbersApplication Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
 
Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
DHS Cybersecurity Webinar
DHS Cybersecurity Webinar DHS Cybersecurity Webinar
DHS Cybersecurity Webinar
 
Rachel Resume
Rachel ResumeRachel Resume
Rachel Resume
 

More from Tuan Yang

Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdfLearn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdfTuan Yang
 
Defense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdfDefense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdfTuan Yang
 
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdfCybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdfTuan Yang
 
An Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdfAn Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdfTuan Yang
 
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...Tuan Yang
 
What is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdfWhat is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdfTuan Yang
 
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdfWhat is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdfTuan Yang
 
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdfAgile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdfTuan Yang
 
Getting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdfGetting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdfTuan Yang
 
Certified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdfCertified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdfTuan Yang
 
An overview of agile methods and agile project management
An overview of agile methods and agile project management An overview of agile methods and agile project management
An overview of agile methods and agile project management Tuan Yang
 
The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)Tuan Yang
 
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)Tuan Yang
 
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital ForensicsCHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital ForensicsTuan Yang
 
Master Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWSMaster Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWSTuan Yang
 
How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.Tuan Yang
 
Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...Tuan Yang
 
NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...Tuan Yang
 
NetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender freNetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender freTuan Yang
 
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...NetCom learning webinar an introduction to itil®4 create, deliver & suppo...
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...Tuan Yang
 

More from Tuan Yang (20)

Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdfLearn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
 
Defense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdfDefense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdf
 
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdfCybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
 
An Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdfAn Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdf
 
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
 
What is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdfWhat is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdf
 
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdfWhat is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
 
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdfAgile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
 
Getting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdfGetting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdf
 
Certified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdfCertified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdf
 
An overview of agile methods and agile project management
An overview of agile methods and agile project management An overview of agile methods and agile project management
An overview of agile methods and agile project management
 
The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)
 
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
 
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital ForensicsCHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
 
Master Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWSMaster Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWS
 
How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.
 
Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...
 
NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...
 
NetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender freNetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender fre
 
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...NetCom learning webinar an introduction to itil®4 create, deliver & suppo...
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...
 

Recently uploaded

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationNeilDeclaro1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Best Practices to Cybersecurity Vulnerability Management,.pdf

  • 1.
  • 2. ABOUT NETCOM LEARNING NetCom Learning is an award-winning global leader in managed learning services,training and talentdevelopment. Founded Headquarters Delivery Capability : 1998 : New Y orkCity : Worldwide CEO : Russel Sarder 100K+ Professionals trained 14K+ C orporate clients 3500 IT ,Business& Soft Skilscourses 96% Of customers recommend usto others 8.6/9 Instructor evaluations 20+ Leadingvendors recognitions Microsoft’s Worldwide training partner of the year 80% Trained ofthe Fortune 100 T op20 ITTraining Company Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com © 1998-2022 NetCom Learning
  • 3. CLICK HERE TO WATCH Access the Recorded Session here! © Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning (888) 563-8266 | comptia@netcomlearning.com
  • 4. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com | | | AGENDA Importance of threat data and intelligence Introduction to vulnerability management activities Common vulnerability assessment tools Implementation of security measures Q&A
  • 5. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com | | | WHY VULNERABILITY ASSESSMENT? • A vulnerability assessment is designed to identify unpatched and exploitable vulnerabilities, giving the organization the opportunity to remediate these deficiencies before they are discovered by a bad actor. • The evolving tools, tactics and procedures used by cybercriminals to breach networks means that it's important to regularly test your organization's cyber security. • Vulnerability assessment helps to protect your organization by providing visibility of security weaknesses and guidance to address them. • It helps with greater security insights, ongoing risk management, and the ability to meet regulatory obligations.
  • 6. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com | | | • Vulnerability management is different from vulnerability assessment. • Vulnerability management is an ongoing process, while a vulnerability assessment is a one-time evaluation of a host or network. • Vulnerability assessment is part of the vulnerability management process, but not vice versa. VULNERABILITY ASSESSMENT VS. VULNERABILITY MGMT.
  • 7. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com | | | • Collection and analysis of information about threats and adversaries- drawing patterns- provide an ability to make decisions – for preparedness, prevention, response- against various cyber attacks. • Identify and mitigate various business risks- Implementing various advanced and proactive defense strategies. • CTI is Collecting information about presumed attacks to understand their motive behind attacks- the approach they must follow- analyze this information for securing IT infrastructure of an organization in advance. CYBER THREAT INTELLIGENCE Information Meaningful Intelligence Analyzed, interpreted, In-depth knowledge Supports Decision making & Response Actions Data Raw, huge, no context, un-processed (Structured/ Unstructured)
  • 8. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com | | | IMPORTANCE OF THREAT DATA AND INTELLIGENCE • Threat intelligence is data that is collected, processed, and analyzed to understand a threat actor’s motives, targets, and attack behaviors. • Threat intelligence enables us to make faster, more informed, data-backed security decisions and change their behavior from reactive to proactive in the fight against threat actors. • Threat intelligence is evidence-based about existing or emerging menaces or hazards to assets. • Threat intelligence benefits organizations of all shapes and sizes by helping process threat data to better understand their attackers, respond faster to incidents, and proactively get ahead of a threat actor’s next move. • Ensure you stay up to date with the often-overwhelming volume of threats, including methods, vulnerabilities, targets and bad actors. • Reducing risk • Preventing financial loss
  • 9. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com | | | BENEFITS OF THREAT INTELLIGENCE • Providing greater insights into cyber threats • Preventing data loss- by identifying cause of data leakage • Guiding in incident response • Conducting data analysis- to identify exploitable data • Helps in conducting threat analysis- detecting advanced threats • Helps in sharing threat information- spread awareness • Identifying IOCs • Discovering tactics, techniques and procedures (TTPs) for possible attacks
  • 10. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com | | | VULNERABILITY RESEARCH VS. VULNERABILITY ASSESSMENT Vulnerability Research • Discovering vulnerabilities and design flaws • Vulnerabilities are classified based on • Severity Level- Low, medium, high • Exploit Range- Local or Remote • An administrator needs vulnerability research • Gather information about security trends, threats, attacks • Gather information that helps to prevent security problems • Find weakness and alert concerned person before a network attack • To know how to recover from a network attack Vulnerability Assessment • Examination of the ability of a system or application to withstand assault • Vulnerability assessment may be used to • Identify weakness that could be exploited • Predict effectiveness of additional security measures in protecting information from attacks
  • 11. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com | | | VULNERABILITY SCORING SYSTEMS AND DATABASES • Common Vulnerability Scoring System (CVSS) • CVSS provides an open framework for communicating the characteristics and impacts of IT vulnerabilities • Its quantitative model ensures repeatable accurate measurement, while enabling users to view the underlying vulnerability characteristics used to generate the scores. • Common Vulnerabilities and Exposures (CVE) • A publicly available and free-to-use list or dictionary of standardized identifiers for common software vulnerabilities and exposures • National Vulnerability Database (NVD) • A U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP) • These data enable the automation of vulnerability management, security measurement, and compliance • The NVD includes databases of security checklist references, security-related software flaws, misconfigurations, product names, and impact metrics • Common Weakness Enumeration (CWE) • A category system for software vulnerabilities and weaknesses • It is sponsored by the National Cybersecurity FFRDC, which is owned by The MITRE Corporation, with support from US-CERT and the National Cyber Security Division of the U.S. Department of Homeland Security • It has over 600 categories of weaknesses, which enable CWE to be effectively employed by the community as a baseline for weakness identification, mitigation, and prevention efforts.
  • 12. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com | | | VULNERABILITY CLASSIFICATION • Misconfigurations • Default Installations • Buffer overflows • Unpatched Servers • Design Flaws • Operating system flaws • Application Flaws • Open services • Default passwords
  • 13. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com | | | TYPES OF VULNERABILITY ASSESSMENT • Active Assessment • Uses a network scanner to find hosts, services, and vulnerabilities • Passive Assessment • Used to sniff the network traffic to discover present active systems, network services, applications, and vulnerabilities present • External Assessment • Assesses the network from a hacker's perspective to discover exploits and vulnerabilities that are accessible to the outside world • Internal Assessment • Scans the internal infrastructure to discover exploits and vulnerabilities • Host-based Assessment • Conducts a configuration-level check to identify system configurations, user directories, file systems, registry settings, etc., to evaluate the possibility of compromise • Network-based Assessment • Determines possible network security attacks that may occur on the organization’s system • Application Assessment • Tests and analyzes all elements of the web infrastructure for any misconfiguration, outdated content, or known vulnerabilities • Database Assessment • Focuses on testing databases, such as MYSQL, MSSQL, ORACLE, POSTGRESQL,etc., for the presence of data exposure or injection type vulnerabilities
  • 14. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com | | | TYPES OF VULNERABILITY ASSESSMENT • Wireless Network Assessment • Determines the vulnerabilities in the organization’s wireless networks • Distributed Assessment • Assesses the distributed organization assets, such as client and server applications, simultaneously through appropriate synchronization techniques • Credentialed Assessment • Assesses the network by obtaining the credentials of all machines present in the network • Non-Credentialed Assessment • Assesses the network without acquiring any credentials of the assets present in the enterprise network • Manual Assessment • In this type of assessment, the ethical hacker manually assesses the vulnerabilities, vulnerability ranking, vulnerability score, etc. • Automated Assessment • In this type of assessment, the ethical hacker employs various vulnerability assessment tools, such as Nessus, Qualys, GFI LanGuard, etc.
  • 15. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com | | | VULNERABILITY ASSESSMENT TOOLS • Qualys Vulnerability Management • A cloud-based service that offers immediate global visibility into IT system areas that might be vulnerable to the latest Internet threats and how to protect them • Aids in the continuous identification of threats and monitoring of unexpected changes in a network before they become breaches • Nessus Professional • An assessment solution for identifying the vulnerabilities, configuration issues, and malware. • GFI LanGuard • Scans, detects, assesses, and rectifies security vulnerabilities in a network and connected devices • OpenVAS • A framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution • Nikto • A web server assessment tool that examines a web server to discover potential problems and security vulnerabilities
  • 16. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com | | | VULNERABILITY ASSESSMENT TOOLS • Qualys FreeScan https://freescan.qualys.com • Acunetix Web Vulnerability Scanner https://www.acunetix.com • Microsoft Baseline Security Analyzer (MBSA) https://www.microsoft.com • beSECURE (AVDS) https://www.beyondsecurity.com • Nexpose https://www.rapid7.com • Core Impact Pro https://www.coresecurity.com • N-Stalker Web Application Security Scanner https://www.nstalker.com • SAINT https://www.saintcorporation.com • ManageEngine Vulnerability Manager Plus https://www.manageengine.com
  • 17. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com | | | CHOOSING A VULNERABILITY ASSESSMENT TOOL Vulnerability assessment tools are used to test a host or application for vulnerabilities Choose the tools that best satisfy the following requirements: • Can test from dozens to 30,000 different vulnerabilities, depending on the product • Contains several hundred different attack signatures • Matches your environment and expertise • Has accurate network, application mapping, and penetration tests • Has several regularly updated vulnerability scripts for the platforms that you are scanning • Generates reports • Checks different levels of penetration in order to prevent lockups • Ensure that it does not damage your network or system while running tools • Understand the functionality, and decide on the information that needs to be collected before beginning • Decide the source location of the scan, taking into consideration the information that needs to be collected • Enable logging every time a computer is scanned • Users should scan their systems frequently for vulnerabilities
  • 18. © 1998-2022 NetCom Learning Interested in training? Contact us! www.netcomlearning.com (888) 563-8266 comptia@netcomlearning.com | | | IMPLEMENTATION OF SECURITY MEASURES • Develop a cybersecurity strategy for your organization, A cybersecurity strategy is a high-level plan for how your organization will secure its assets during the next three to five years. • Create a detailed cybersecurity policy, A cybersecurity policy sets the standards of behavior for activities such as the encryption of email attachments and restrictions on the use of social media. • Backup and encrypt your data. • Use multi-factor authentication. • Create secure passwords and keep them safe. • Use the principle of least privilege. • Know who is accessing your data. • Educate and train your employees. • Keep all software and apps up to date. • Don’t underestimate hackers.
  • 19. RECOMMENDED COURSES NetCom Learning offers a comprehensive portfolio for Security » EC-COUNCIL CHFI: COMPUTER HACKING FORENSIC INVESTIGATOR V10 – Class Scheduled on Oct 17 » COMPTIA PENTEST+ CERTIFICATION PREP (EXAM PT0-002) - Class Scheduled on Dec 12 » COMPTIA SECURITY+ CERTIFICATION PREP (EXAM SY0-601) - Class Scheduled on Oct 24 You can also access the below Marketing Assets » Free 1hr Training - Getting started with 5 fundamental domains of cybersecurity governance » Free On-Demand Training - Learn to Defend Against Multi-Stage Network Breaches in 40 Minutes » Blog - What’s New in EC-Council CEH v12: Features & Updates Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning (888) 563-8266 | comptia@netcomlearning.com
  • 20. OTHER MARKETING ASSETS COURSES & CERTIFICATIONS Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning OUR FREE VIRTUAL EVENTS BLOGS SAVINGS PROGRAMS & PROMOS (888) 563-8266 | comptia@netcomlearning.com
  • 21. Stay Digital Safe - Assess and Upskill your team against cyber threats now ! NetCom Learning's end-user Cybersecurity Awareness Training & Phishing Simulation Solution offers phishing simulations on email, voice, and text to organizations, and is bundled with 90+ interactive security awareness video courses for the end-users. Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning (888) 563-8266 | comptia@netcomlearning.com Request a Demo
  • 22. The number of cyberattacks across the globe is increasing with time. Can you afford to compromise your organization’s security? Equip your workforce with advanced ethical hacking skills with all new EC-Council C|EH® v12 and improve your organizational security! Upskill Now Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning (888) 563-8266 | comptia@netcomlearning.com
  • 23. Learning Passport Flexible Team Training Package Specifically designed to be customized for the number of learners you plan to train on top-notch technology providers – including Microsoft, AWS, Cisco, CompTIA, Adobe, Autodesk, PMI, EC-Council, and more. Redeemable over 4,000+ official courses Flexible fund validity of 12 months Contact Us Now To Schedule your appointment with our learning consultants. Toll-free Phone: 1-888-563-8266 | Email: info@netcomlearning.com Learn More Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning (888) 563-8266 | comptia@netcomlearning.com
  • 24. NetCom Individual Learner Subscription Get 24/7 access to unlimited virtual instructor-led and self-paced IT and business training for 12 months. NetCom+ includes over 250 e-Learning and 140 virtual instructor led courses across various domains. $2,999 per learner per year * Additional discounts available for enterprises + Learn More Interested in training? Contact us! | www.netcomlearning.com | © 1998-2022 NetCom Learning (888) 563-8266 | comptia@netcomlearning.com
  • 25. FOLLOW US ON LinkedIn T witter YouTube Instagram Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com © 1998-2022 NetCom Learning
  • 26. A BOOK FROM RUSSELL SARDER CEO - NETCOM LEARNING A framework to build a smarter workforce, adapt to change and drive growth. Download Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com © 1998-2022 NetCom Learning
  • 27. Thankyou Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com © 1998-2022 NetCom Learning