New Training: Perform a Vulnerability Scan

In this 5-video skill, CBT Nuggets trainer Shawn Powers teaches you how to scan a network for vulnerabilities. Watch this new CompTIA training.
Learn CompTIA with one of these courses:
This training includes:
5 videos
21 minutes of training
You’ll learn these topics in this skill:
Intro to Vulnerability Scanning
Identifying Types of Scans
Handling Scanning Permissions
Scanning Applications and Containers
Scanning Considerations
Vulnerability Scanning vs Penetration Testing: How Do They Differ?
Vulnerability scanning and penetration testing are two distinct security testing strategies to expose vulnerabilities within an IT environment. Although these strategies are both designed to expose vulnerabilities and share a lot of similarities, they have uniquely differentiating characteristics.
Vulnerability scanning is an automated process that identifies and catalogs all network-attached devices and attempts to catalog the operating system and unique applications and software installed on the device. This process is intended to catalog and determine if network-attached devices are accessible.
Alternatively, penetration testing is the security testing strategy that attempts to expose vulnerabilities within an IT environment by leveraging common cyber-attack strategies.
Penetration testing goes deeper than vulnerability scanning in the sense that it uses any and all methods to expose vulnerabilities in a network. Whereas vulnerability scanning catalogs network-attached devices, notifying the use of some potential vulnerabilities based on what’s gathered when cataloging the devices.
delivered to your inbox.
By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.