From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 23,200 courses taught by industry experts.
Updates and patches
From the course: Ethical Hacking: Vulnerability Analysis
Updates and patches
- [Instructor] On a local area network an operating system can be a vulnerable target. There are many threats that come from a number of different sources including hackers, malware, and phishing attacks. Hardening an operating system minimizes exposure to threats. Whether you're a network administrator, a security analyst, or even an end user, the following will provide guidelines on how to mitigate vulnerabilities on an operating system. There are several good practices. Use antivirus and antispyware protection and schedule daily automatic definition updates and scans. Secure email systems to minimize threats. Do not open any suspicious email attachments or respond to requests from unknown senders. Conduct periodic risk assessments to identify specific threats, and determine the effectiveness of security controls. Use strong passwords or passphrases for all user accounts. Disable any unneeded user accounts, and…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.