Information Gathering and Vulnerability Scanning for Penetration Testing Online Training

    Taught by
    UPDATED: February 26, 2021
    Intermediate

    This intermediate Information Gathering and Vulnerability Scanning for Penetration Testing training equips security technicians with the skills to gather critical system data and conduct effective vulnerability scans. Learn how to prepare for penetration tests, identify security flaws, and optimize test results. This cybersecurity training is a great resource for penetration testers and cybersecurity professionals.

    Start a free week

    Watch the first video free

    Subscription options

    $59.00

    Access all premium content with a free week!

    • quizzes
      Quizzes
    • practice-exams
      CyberVista® IT practice exams
    • coaching
      Coaching
    • learner-management
      IT learner community
    Start a free week

    What you'll learn

    • Leveraging both passive and active information gathering
    • Identifying sources of information and how to import them
    • Analyzing data streams for relevant information
    • Using technologies and tools custom built for pen testing and vulnerability scanning

    FAQs

    What will you learn in this penetration testing and vulnerability scanning training?

    This pentesting course emphasizes a particularly important part of vulnerability scanning: gathering information about your target system ahead of time. You'll learn what the most important information is to gather before you attempt a vulnerability scan, and also the practical skills of how to go and actually gather it.

    Who should take this vulnerability scanning and penetration testing course?

    The best audience for this course on pre-vulnerability scanning information gathering is cybersecurity professionals whose job requires them to participate in penetration tests or active cyber defense maintenance and configurations. It's also a great course to take if that's the direction you want to move your career in.

    Is this training in vulnerability scanning and penetration testing associated with any certifications?

    Not directly, no – this course on the information gathering that precedes a vulnerability scan is focused on practical skills that cybersecurity professionals who perform penetration tests need. But this training covers lots of different tools, technologies and approaches to performing vulnerability tests, so it'll help with many certifying exams.

    What certification should you consider after taking this course in vulnerability scanning and penetration testing?

    Although there are a few different cybersecurity certifications you could explore after taking this course, the best cert to consider is the PenTest+ from CompTIA. CompTIA has a great track record of high-quality and well-respected IT certifications, and their penetration testing certification is an industry leader.

    Why should you take this vulnerability scanning and penetration testing training?

    You should take this training because knowing how to do good vulnerability scans is an extremely valuable skill, but it's easier to do bad vulnerability scans than it is to do good ones. Learn the right information to gather beforehand so that your vulnerability scans are useful and accurate.

    Who is this for?

    This Information Gathering and Vulnerability Scanning for Penetration Testing training is considered specialist-level security training, which means it was designed for security technicians with three to five years of experience with information gathering and vulnerability scans.

    target-audience-face-11target-audience-face-6target-audience-face-12

    What our learners say

    • CBT Nuggets fits into my day-to-day amazingly.

      John M. | IT Manager
    • This is the gold standard of video training. You always hear in grade school or college that the best teachers are the ones who are passionate in their field. The CBT Nuggets team are extremely passionate and get you motivated for the material.

      Michael J. | IS&T Major Incident Manager
    • When learning a new technology, people sometimes build a wall that complicates the learning process because of the unknown. I like tearing down that wall — and having people fall in love with that technology.

      Lalo Nunez | CBT Nuggets trainer since 2020
    Study plan

    Download the free Information Gathering and Vulnerability Scanning for Penetration Testing Online Training study plan to complete this course in about 5 hours.

    Download study plan

    Related Topics

    Get CBT Nuggets IT training news and resources

    I have read and understood the privacy policy and am able to consent to it.

    © 2025 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522