Creating Recommendations Based on Vulnerability Assessments Lab Overview

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

10 hours 25 minutes
Video Transcription
everyone, welcome back to the core. So in this particular lab you're going to be using and mapping open Voss again so you'll be identifying different systems with end map. And then you'll be performing a vulnerability scan on those systems using open Voss, and you'll also be doing some reporting at the end of the lab
again. As always on these particular labs and this course, you just want to make sure you're checking the box on the right side here as you go through the instructions. So that way, you get full credit for the lab once your complete
and if you haven't already done a little two step by step guides, be sure to do that from the resource section of the course, or you can also just follow along with the instructions on the right side of the lab itself.
Up Next