Information Gathering and Vulnerability Scanning for Penetration Testing Online Training

    Taught by
    UPDATED: February 26, 2021
    Intermediate

    This intermediate Information Gathering and Vulnerability Scanning for Penetration Testing training equips security technicians with the skills to gather critical system data and conduct effective vulnerability scans. Learn how to prepare for penetration tests, identify security flaws, and optimize test results. This cybersecurity training is a great resource for penetration testers and cybersecurity professionals.

    Start a free week

    Subscription options

    $59.00

    Access all premium content with a free week!

    • Quizzes
    • CyberVista® IT practice exams
    • Coaching
    • IT learner community
    Start a free week
    G2 Logo
    4.5 reviews stars

    What you'll learn

    • Leveraging both passive and active information gathering
    • Identifying sources of information and how to import them
    • Analyzing data streams for relevant information
    • Using technologies and tools custom built for pen testing and vulnerability scanning

    FAQs

    What will you learn in this penetration testing and vulnerability scanning training?

    This pentesting course emphasizes a particularly important part of vulnerability scanning: gathering information about your target system ahead of time. You'll learn what the most important information is to gather before you attempt a vulnerability scan, and also the practical skills of how to go and actually gather it.

    Who should take this vulnerability scanning and penetration testing course?

    The best audience for this course on pre-vulnerability scanning information gathering is cybersecurity professionals whose job requires them to participate in penetration tests or active cyber defense maintenance and configurations. It's also a great course to take if that's the direction you want to move your career in.

    Is this training in vulnerability scanning and penetration testing associated with any certifications?

    Not directly, no – this course on the information gathering that precedes a vulnerability scan is focused on practical skills that cybersecurity professionals who perform penetration tests need. But this training covers lots of different tools, technologies and approaches to performing vulnerability tests, so it'll help with many certifying exams.

    What certification should you consider after taking this course in vulnerability scanning and penetration testing?

    Although there are a few different cybersecurity certifications you could explore after taking this course, the best cert to consider is the PenTest+ from CompTIA. CompTIA has a great track record of high-quality and well-respected IT certifications, and their penetration testing certification is an industry leader.

    Why should you take this vulnerability scanning and penetration testing training?

    You should take this training because knowing how to do good vulnerability scans is an extremely valuable skill, but it's easier to do bad vulnerability scans than it is to do good ones. Learn the right information to gather beforehand so that your vulnerability scans are useful and accurate.

    Who is this for?

    This Information Gathering and Vulnerability Scanning for Penetration Testing training is considered specialist-level security training, which means it was designed for security technicians with three to five years of experience with information gathering and vulnerability scans.

    target-audience-face-5target-audience-face-9target-audience-face-4

    What our learners say

    • The more I put into learning, the more skills I’m going to have — and the better I’m going to be technically.

      Knox Hutchinson | CBT Nuggets trainer since 2018
    • CBT Nuggets fits into my day-to-day amazingly.

      John M. | IT Manager
    • Very easy and fun way to learn. Keith Barker is my favorite, he'll throw in jokes here and there and it makes me remember certain study points. I highly recommend this app and purchasing subscriptions, it is truly worth the money.

      Joshua E. | IT Systems Administrator
    Study plan

    Download the free Information Gathering and Vulnerability Scanning for Penetration Testing Online Training study plan to complete this course in about 5 hours.

    Download study plan

    Related Topics

    Get CBT Nuggets IT training news and resources

    I have read and understood the privacy policy and am able to consent to it.

    © 2024 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522