Vulnerability Scanning

Learn to identify security vulnerabilities in the assets of an organization.

Overview

Vulnerability scanning serves two purposes:

  • Evaluating assets for their security hardiness.

  • Identifying all endpoints connected to the network.

Step one: Network scan

Performing a network scan first is standard procedure for vulnerability scanning. This is useful for asset identification, including finding items that aren’t documented or are unknown. These could be either:

  • Rogue endpoints.

  • Devices that have been installed for legitimate ...