VULNERABILITY-ANALYSIS

Teacher
Siva priya
Category
regular
Duration Time
5 days

ABOUT THE COURSE

This vulnerability allows a local or remote attacker to execute code within the context of an application linked with certain versions of the glibc library. The vulnerability is triggered by a buffer overflow in the gethostbyname() function, called when resolving a hostname to an IP.

Immediate patches are required to fix a vulnerability in glibc that allows arbitrary code execution from unauthenticated users. It is necessary to restart computers or processes following patching.

Ghost enables code execution, arbitrary data disclosure, and system compromise from unauthenticated remote attackers. The ways that a system could be vulnerable to this bug are numerous, and no exhaustive list could be compiled. Patching is required immediately, as a proof-of-concept is soon to be publicly released.

CODE OF ETHICS - EC-Council


What You Will Learn

The following tables list Microsoft Certifications by name and describe how they enable IT professionals to display and validate their skills and experience.

Key Features


20 hours of high quality eLearning content
What You Will Learn
Achievements in work
72 end of chapter quizzes
CD's
Participation Certificate

Who Should Attend


Security Professionals
Security Officers
Security Auditors
Network/System Administrators
Anyone who is concerned about the integrity of the network infrastructure

topics covered


IT professional

Module 01: Introduction
Module 02: Descriptioin
Module 03: Threat Assessment
Module 04: Vulnerability Assessment
Module 05: Risk Analysis
Module 06: Upgrade Recommendations
Module 07: Re-Valuation of Risks
Module 08: Summary
Module 09: Application