Using Risk Management ToolsYou must be logged in to view this content. Course Content Expand All | Collapse All Lessons Status 1 Introduction 2 Understanding Risk Management Threats and Threat Assessments/Vulnerabilities Risk Management Risk Registers/Supply Chain Assessment Risk Assessment Qualitative Risk Assessment Quantitative Risk Assessment 3 Comparing Scanning and Testing Tools Password Crackers Network Scanners Vulnerability Scanning Credentialed VS Non-Credentialed/Configuration Compliance Scanner Penetration Testing Intrusive VS Non-Intrusive Testing/Passive VS Active Tools/Exploitation Frameworks Network Mapping/Wireless Scanners/Rogue System Detection/Banner Grabbing 4 Using Security Tools Sniffing with a Protocol Analyzer Command-Line Tools Monitoring Logs for Event Anomalies SIEM Continuous Monitoring/Usage & Permission Auditing and Reviews 5 Using Risk Management Tools Exam Topic Review