Vulnerability Scanning
Learn to identify security vulnerabilities in the assets of an organization.
Overview
Vulnerability scanning serves two purposes:
-
Evaluating assets for their security hardiness.
-
Identifying all endpoints connected to the network.
Step one: Network scan
Performing a network scan first is standard procedure for vulnerability scanning. This is useful for asset identification, including finding items that aren’t documented or are unknown. These could be either:
-
Rogue endpoints.
-
Devices that have been installed for legitimate ...