December 2017
Intermediate to advanced
364 pages
7h 30m
English
Scanning for vulnerabilities is one of the best understood periodic activities security teams take up on their computers. There are well-documented strategies and best practices for doing regular scanning for vulnerabilities in computers, networks, operating system software, and application software:
With networked systems, this type of scanning is usually executed from a connected host that has the right kind of permissions to scan for security issues.
One of the most popular vulnerability scanning tools is Nessus. Nessus started as a network vulnerability scanning tool, but now incorporates features ...