Discover how to properly perform and analyze vulnerability scans.
CompTIA PenTest+: Vulnerability Identification
- compare different types of scans
- define scanning considerations
- scan applications and containers
- categorize assets for scans
- describe adjudication and prioritization of scans
- define common scanning themes
- perform a vulnerability scan
- analyze a vulnerability scan
- describe vulnerability scanning
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.