After reading this chapter and completing the activities, you will be able to:
Describe vulnerabilities of the Windows and Linux operating systems
Identify specific vulnerabilities and explain ways to fix them
Explain techniques to harden systems against Windows and Linux vulnerabilities
In Chapter 6, you learned how to enumerate systems to discover open ports that can be used to access data and resources. ...