Review the process of vulnerability scanning, common vulnerability scanning tools and scan analysis with this four-video course.
Course description
The first step to solving a problem is recognizing that you have one, and that goes double for systems. With this course, you’ll review four videos covering the details of the vulnerability scanning process. Explore common vulnerability scanners, scanning considerations (when do you scan? What protocols do you use? What about fragile or non-traditional systems?), application and container scans, and analyzing the scan data once the scan has been completed.