IT Security Gumbo: Vulnerability Management Analysis

Certified Vulnerability Assesor Training |Quickly Identify Threats, Exploits and Vulnerabilities

Instructed by Corey Charles

  • Includes all Standard Features
  • Get Unlimited access to all the courses
  • No Contract. Cancel Anytime
Starting in just $19 / mo see all plans
Subscribe Now
$ 299
Annual Subscription
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
  • The students will acquire a new or add to there existing skill level in Vulnerability Management, Patch Management and a starting basis to Penetration Testing. The student will know how to throughly and quickly identify threats, exploits and vulnerabilities in all environments. The student will also acquire skills in risk management and learn when to accept or deny risk.

The IT Security Gumbo: Vulnerability Management Anaysisl, gives the students the insider of the Vulnerability Management Experience Program. The student will learn uncovered techniques in remediation and mitigation process of vulnerabilities. The students will learn to uncover threats and exploits instantly in cloud based and non-cloud based environments. The students will also learn how to accept or deny risk based on critically and also will be equipped with the knowledge of interpreting this information to technical and non technical professionals.  The Vulnerability Management Experience: The Prequel is recognized as a CEU based course.  This course is a great foundation to begin or continue to grow in your IT Security and/or Penetration Testing career.

  • Students should have a general knowledge of computer security and computer networking.
  • All levels of IT Professionals
View More...

Section 1 : Introduction

  • Lecture 1 :

Section 2 : ACT I: Addressing Vulnerabilities

  • Lecture 1 :
  • Types of Vulnerabilities
  • Lecture 2 :
  • Remediation
  • Lecture 3 :
  • Mitigation
  • Lecture 4 :
  • Discovery
  • Lecture 5 :
  • Nessus Translation

Section 3 : ACT II: The Security Testing Phase

  • Lecture 1 :
  • Security Testing
  • Lecture 2 :
  • Security Testing Part 2
  • Lecture 3 :
  • Security Testing Approach
  • Lecture 4 :
  • Reporting
  • Lecture 5 :
  • Priorities

Section 4 : ACT III: Network Based Vulnerabilties

  • Lecture 1 :
  • TCP/ IP Vulnerabilities
  • Lecture 2 :
  • ICMP Vulnerabilities
  • Lecture 3 :
  • UDP Vulnerabilities
  • Lecture 4 :
  • Wireshark Findings
  • Lecture 5 :
  • Vulnerability Analysis

Section 5 : Vulnerability Analysis/ Penetration Testing Labs

  • Lecture 1 :
  • Basic Scanning
  • Lecture 2 :
  • Analyzing SQL Attack

Corey Charles,

Corey Charles was born and grew up in New Orleans, LA. He's now been in IT Security field for 13 years and has been recognized by many of his clients for his skilled work in the vulnerability management subject matter. Mr. Charles is the owner and CEO of DreamVision IT LLC and has partnered with likes of cybrary, pluralsight and other teaching platforms to provide on demand IT Security training.
View More...

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80


TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17


The Complete Ethical Hacking Certif...

By : Mohamed Amer

Lecture 151


VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6


CISSP- Certification Introduction


Lecture 18


Practical Blockchain & Smart Contra...

By : Abhilash Nelson

Lecture 40



Enjoy Limitless Learning. Get Access to Unlimited Courses with Premium Subscrption Subscribe Now

Sign up and start learning
By signing up. you agree to our Terms of Use and Privacy Policy
Forget Password