Risk Assessment with OpenCVE
Learn how to stay up-to-date with software and all the latest published vulnerabilities. In this course, you will learn the setup, configuration, and validation of OpenCVE in an enterprise environment.
Every day, numerous vulnerabilities are being published. If you use, install, or maintain software, it is hard to keep up-to-date. In this course, Risk Assessment with OpenCVE, you’ll cover how to utilize OpenCVE to secure a live enterprise environment. First, you’ll demonstrate how to install OpenCVE. Next, you’ll apply specific configurations which will alert you when vulnerabilities are published for software you use. Finally, you’ll simulate how to query the database for specific software or products. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.
Author Name: Peter Mosmans
Author Description:
Peter started out in the nineties as software engineer working on internet banking applications for various European financial institutions. After developing, he moved to the role of defending and designing systems and networks for high-availability websites. Since 2004 he started specializing in breaking: pentesting complex and feature-rich web applications. Currently he leads a global team of highly skilled penetration testers as lead pentester. He is a contributor to several open-source penet… more
Table of Contents
- Course Overview
1min - Setting up, Configuring, and Using OpenCVE
27mins - Resources
3mins
There are no reviews yet.