Vulnerability Assessment | Theory | Part 2
Автор: NethaxStark
Загружено: 2026-03-12
Просмотров: 4
Описание:
Copyright Disclaimer: Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.
In today's video i have told you how you guys can fix the lag and increase it's speed after doing some little changes into the system or by just running some commands.
Welcome to another session in our Certified Ethical Hacker (CEH v13) course!
In today's class, we dive deep into the core concepts of Vulnerability Assessment. Before we can exploit or secure a system, we must first understand its weaknesses.
In this session, we cover:
What is a Vulnerability? Understanding the definition and how it differs from a threat or an exploit.
Introduction to Vulnerability Assessment (VA): The systematic process of identifying, quantifying, and prioritizing vulnerabilities in a system.
Goals of VA: What are we actually trying to achieve? (Risk identification, compliance, security posture improvement).
Types of Vulnerability Assessments:
Host Assessment
Network Assessment
Database Assessment
Application Assessment (Web/API)
Vulnerability Assessment vs. Penetration Testing: A critical distinction—knowing the difference between scanning for holes and actively exploiting them.
Phases of VA: (If covered in detail in this specific class) e.g., Planning, Scanning, Analysis, Remediation.
Introduction to Tools: A brief look at the types of tools used (like Nessus, OpenVAS, etc.) as per the CEH v13 curriculum.
This class provides the foundational knowledge required to become a skilled ethical hacker. Make sure to watch the next video where we move into practical scanning techniques!
👍 If you found this helpful, please LIKE, SHARE, and SUBSCRIBE for more ethical hacking tutorials!
🔔 Hit the bell icon so you never miss an update.
------------------------------------------------------------------------------------
Education Purposes
.
Git clone link Of Camphish - https://www.github.com/nethaxstark/Ca...
Hi, thanks for watching our video about!
ABOUT MY CHANNEL
My channel is about Hacking and Networking. I cover lots of cool stuff such as Programing, Networking and How to Videos
Check out our channel here:
/ nethaxstark
Don’t forget to subscribe!
CHECK OUT OUR OTHER VIDEOS
• Html Injection | Bug Bounty | Penetration...
• Burp suite | Intruder | How Website Brutef...
• ARP Poisoning Attack | NethaxStark
• Finding Connected Devices |NethaxStark
FIND US AT
GET IN TOUCH
FOLLOW US ON SOCIAL
Get updates or reach out to Get updates on our Social Media Profiles!
Instagram -- / nethaxstark
Instagram -- / ajayyx9
#nethaxstark
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: