Chapter 11

Network Scanning and Vulnerability Scanning

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

  • A shaded box with a faded outline. Understand how to verify the security of a system

  • A shaded box with a faded outline. Probe a system for vulnerabilities

  • A shaded box with a faded outline. Use vulnerability scanning tools

  • A shaded box with a faded outline. Evaluate potential security consultants

Introduction

At ...

Get Computer Security Fundamentals, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.