Download presentation
Presentation is loading. Please wait.
Published byJulius Price Modified over 8 years ago
1
Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning
2
© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 2 Chapter 11 Objectives Understand how to secure a system Probe a system for vulnerabilities Use Vulnerability vulnerability scanning tools Evaluate potential security consultants Understand how to secure a system Probe a system for vulnerabilities Use Vulnerability vulnerability scanning tools Evaluate potential security consultants
3
© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 3 Introduction Secure the system.
4
© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 4 Basics of Security Ports Protect Policies Probe Physical
5
© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 5 MBSA Microsoft Baseline Security Analyzer
6
© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 6 Nessus Popular Vulnerability Scanner
7
© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 7 Getting Professional Help Certification Education Experience Background Checks
8
Certifications CEH CISSP Security+ Vendor-specific (Microsoft, Cisco, and so on) GAIC © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 8
9
Education Computer Science Engineering Computer Information Systems Security Degrees © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 9
10
Background and Experience Prior Security Experience Criminal Background Check Credit Check References Check © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 10
11
© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 11 Summary Information The more information you have about the vulnerabilities and weaknesses of your system, the better prepared you are to defend it. The more information the hacker has about your system’s vulnerabilities and weaknesses, the sooner it will be violated. The tools in this chapter are for the network and security administrator and are to be used for legal, not illegal, purposes.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.