Vulnerability Research for Hackers and Pen Testers

$99.00

-

CyberQ Skill Packs provide direct hands-on, practical experiences in the EC-Council Cyber Range Platform. The CyberQ Skill Pack – Vulnerability Research for Hackers and Pen Testers provides an assembly of 10 distinct exercises in password cracking. Purchasing this product will enable the Learning Path in your CyberQ Account providing up to three attempts for each challenge.

Description

Vulnerability research is the process of analyzing protocols, services, and configurations to discover the vulnerabilities and design flaws that will expose an operating system and its applications to exploit, attack, or misuse.

A security administrator needs vulnerability research:

  • To gather information about security trends, newly discovered threats, attack surfaces, attack vectors and techniques.
  • To find weaknesses in the OS and applications and alert the network administrator before a network attack.
  • To understand information that helps prevent security problems.
  • To know how to recover from a network attack.

Vulnerability Research Techniques Covered in the Learning Path:

  • Advanced Google Hacking Techniques/li>
  • Source Code Analysis/li>
  • Traffic Analysis/li>
  • ExploitDB Search/li>
  • Searchsploit Search/li>
  • SQL Vulnerability Scanning/li>
  • Vulnerability Scanning using Burpsuite
Skill ID Statement
S0001 Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
S0009 Skill in assessing the robustness of security systems and designs.
S0044 Skill in mimicking threat behaviors.
S0051 Skill in the use of penetration testing tools and techniques.
S0137 Skill in conducting application vulnerability assessments.
S0364 Skill to develop insights about the context of an organization’s threat environment
  • Blue Team Technician
  • Red Team Technician
  • Computer Network Defense (CND) Auditor
  • Ethical Hacker
  • Information Security Engineer
  • Internal Enterprise Auditor
  • Penetration Tester
  • Network Security Engineer
  • Reverse Engineer
  • Risk/Vulnerability Analyst
  • Technical Surveillance Countermeasures Technician
  • Vulnerability Manager

Environment Screenshots