"Vulnerability Management" training programme - " Finding Vulnerabilities 1 - Looking into Networks

Starts
Ends
(Timezone - Europe/Amsterdam)
Zoom

Zoom

Description

Scanning for vulnerabilities in your organisation's network is considered one of the key aspects of vulnerability management. Different scanning and testing approaches will be covered in this module that consists of 3 live online sessions. From scanning the system inside-out or from the outside to simulating actual attacks (pentesting), the attendees will be taken through the introductory steps of conducting and supervising scans and pentests

This is the second module in the "Vulnerability Management" training Programme

Participants will learn:

  • How to scan local systems for vulnerabilities and misconfigurations
  • How to conduct network-wide vulnerability scans
  • How to plan an execute penetration tests

 

The module includes 3 sessions - please note that there is one registration - once registered you are welcome to attend all or selected sessions of this module.

Also please note that we shall send you an invitation with the Zoom link closer to the date of the session.

If you have registered less than an hour before the start of a session please email glad@geant.org to let us know and we shall forward you joining instructions.

Each session will be recorded; we shall notify all the participants how to access recorded sessions once recordings become available.

We look forward to seeing you (virtually) soon.

Registration
Participants
Glad Team (GEANT Learning and Development)
    • 14:00 15:00
      Local Vulnerability Scanning 1h
      • Process
      • Checklists
      • Center for Internet Security (ci security) Benchmarks
      • Tools
      • Lynis
      • CIS-CAT
      • Tiger

      Presenter(s)/Facilitator(s): Stefan Kelm, DFN-CERT

      Affiliation (WP/Task): WP8 Task 1

      Authors (content is created by): Tobias Dussa, Klaus Möller, DFN-CERT

    • 14:00 15:00
      Network Vulnerability Scanning 1h
      • Process (according to SANS)
      • Preparation
      • Vulnerability scan
      • Define remediating actions
      • Implement remediating actions
      • Rescan
      • Tools
      • Portscanner: nmap, ...
      • Vulnerability Scanner: OpenVAS, Nessus,
      • Web Application Scanner: Nikto, Arachni, w3af, ...

      Duration: 1 hour (includes Q&A)

      Webinar Host: Pauline Smith (GLAD)

      Presenter(s)/Facilitator(s): Tobias Dussa , DFN-CERT

      Affiliation (WP/Task): WP8 Task 1

      Authors (content is created by): Klaus Möller, Stefan Kelm, DFN-CERT

    • 14:00 15:00
      Penetration Tests 1h
      • Reasons for penetration testing
      • Types of Penetration Tests
      • Black Box
      • Grey Box
      • White Box
        .- Process
      • Planning
      • Scope
      • Success
      • The difference between penetration tests and vulnerability
        scans

      Duration: 1 hour (includes Q&A)

      Webinar Host: Pauline Smith (GLAD)

      Presenter(s)/Facilitator(s): Klaus Möller, DFN-CERT

      Affiliation (WP/Task): WP8 Task 1

      Authors (content is created by): Stefan Kelm,Tobias Dussa DFN-CERT

Your browser is out of date!

Update your browser to view this website correctly. Update my browser now

×