In this course we will be talking about four main topics in the area of vulnerabilities and system scanning. First, we'll look at the determining what vulnerabilities you may have. We'll discuss port scanning tools and we'll talk about what port scanning is and what that means for you and your organization. We'll take a look at vulnerabilities scanning tools that may be able to find flaws or weaknesses in your system and what you can do about those weaknesses. Finally, we'll take a look at defensive measures you can have to help reduce the chance that port scanning and vulnerability scans can be used against you.
Basic understanding of networking terminology and applications, intranet and internet services, protocols, ports, as well as networking and security devices
Basic knowledge in installation of security software, such as antivirus or firewalls, and general understanding of operating systems functionalities (Windows and Linux)
James Michael Stewart
Michael has over 30 years experience with computers and technology with a focus on security, certification, and various operating systems. He has been teaching job skills and certification courses on topics like CISSP, ethical hacking and penetration testing, computer forensics, and Security Plus for over 20 years. He is also the primary author of two books and holds a variety of certifications including CISSP, CEH, CHFI, ECSA, and Security Plus.