O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using Vulnerability Scanners

As you have learned, some IDS packages now include the capability to perform vulnerability scans of your systems and network. Vulnerability scans are used to uncover problems that may exist on your network. It is best to find these vulnerabilities before a hacker gets a hold of them. In most cases, you will find vulnerability scanners as a separate product from IDS products.

Vulnerability scanners scan your system and network, and then the scanners compare the information gathered to a comprehensive database of vulnerabilities and known configuration issues. The scanner then presents you with a report that details possible issues and weaknesses that need attention. Any issues found are usually categorized by severity, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required