Vulnerability Scanning
Explore how to conduct network and asset vulnerability scans to identify all connected devices, including rogue endpoints. Understand authenticated and unauthenticated scan types and how to use scan results in a vulnerability management program to enhance your system’s security posture.
Overview
Vulnerability scanning serves two purposes:
-
Evaluating assets for their security hardiness.
-
Identifying all endpoints connected to the network. ...