- Network Scanning Cookbook
- Sairam Jetty
- 89字
- 2021-08-13 15:14:20
Summary
To conclude, a Network Vulnerability Scan is a three-phase process including discovery, port scanning, and vulnerability scanning. This, if performed correctly, will help an organization to identify its current security posture and create actionable solutions in order to improve this posture. We have seen the steps to plan a Network Vulnerability Scan in this chapter and the various factors that are involved. In further chapters, we will look into the tutorials on how to perform this Network Vulnerability Scan to identify the vulnerabilities and act on them.
推薦閱讀
- Serverless架構(gòu):從原理、設(shè)計(jì)到項(xiàng)目實(shí)戰(zhàn)
- FTTx PON技術(shù)與應(yīng)用
- 智能光網(wǎng)絡(luò)技術(shù)及應(yīng)用
- 飛利浦/JVC新型彩色電視機(jī)速修圖解
- 通信網(wǎng)技術(shù)基礎(chǔ)
- 移動(dòng)寬帶技術(shù):LTE
- 交換機(jī)/路由器及其配置
- 快修巧修新型等離子和高清晰度電視機(jī)
- 印制電路組件裝焊工藝與技術(shù)
- 5G移動(dòng)終端多天線技術(shù)
- 實(shí)例解讀電子元器件與電路設(shè)計(jì)
- 石墨烯傳感器及其在物聯(lián)網(wǎng)中的應(yīng)用
- 電子產(chǎn)品測試技術(shù)
- 電力通信、信息原理與技術(shù) 上冊(cè):電力通信
- Mastering Wireshark 2