CEH v12: Vulnerability Assessment Types, Models, Tools, and Reports
Christopher Govender
Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Performing a vulnerability assessment allows you to locate potential weaknesses in systems, networks, and channels of communication. This is a vital step in defending systems against attacks.
In this course, you'll learn about the different types of vulnerability assessments. You'll move on to explore various vulnerability assessment models and tools. Finally, you examine important information that should be included in your vulnerability assessment reports.
This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
Issued on
November 13, 2024
Expires on
Does not expire