From the course: CompTIA Advanced Security Practitioner (CASP+) (CAS-004) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Vulnerability assessments

Vulnerability assessments

- In this section of the course, we're going to discuss vulnerability assessments and penetration testing methods that we can use to help minimize the security risks to our enterprise networks. In this section, we'll be focused on Domain 2: Security Operations, specifically Objective 2.4. Objective 2.4 states that, given a scenario, you must use the appropriate vulnerability assessment and penetration testing methods and tools. As we start out this section, we're going to cover the different assessment methods that you're going to be able to utilize, including things like static analysis, dynamic analysis, side-channel analysis, reverse engineering, wireless vulnerability scans, software composition analysis, fuzz testing, or fuzzing; pivoting, post-exploitation, and persistence. Then we'll talk about the different types of network protocol analysis tools that we can use during our assessments. Things like protocol analyzers, network traffic analyzers, port scanners, HTTP…

Contents