loader image
Skip to main content
If you continue browsing this website, you agree to our policies:
x
Completion requirements

Scanners detect vulnerabilities in systems, but how does a scanner find the vulnerabilities? Watch this video and be able to describe six steps in the scanning process. Do scanners exploit the vulnerabilities found in a system?


Source: Virtual University, https://www.youtube.com/watch?v=rndOWGFishw
Creative Commons License This work is licensed under a Creative Commons Attribution 3.0 License.

Last modified: Wednesday, August 7, 2024, 2:08 PM