Scanning for vulnerabilities in your organisation's network is considered one of the key aspects of vulnerability management. Different scanning and testing approaches will be covered in this module that consists of 3 live online sessions. From scanning the system inside-out or from the outside to simulating actual attacks (pentesting), the attendees will be taken through the introductory steps of conducting and supervising scans and pentests.
This is the second module in the "Vulnerability Management" training Programme
Participants will learn:
The module includes 3 sessions - please note that there is one registration - once registered you are welcome to attend all or selected sessions of this module.
Also please note that we shall send you an invitation with the Zoom link closer to the date of the session.
If you have registered less than an hour before the start of a session please email firstname.lastname@example.org to let us know and we shall forward you joining instructions.
Each session will be recorded; we shall notify all the participants how to access recorded sessions once recordings become available.
We look forward to seeing you (virtually) soon.