Creating Recommendations Based on Vulnerability Assessments Lab Overview
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
everyone, welcome back to the core. So in this particular lab you're going to be using and mapping open Voss again so you'll be identifying different systems with end map. And then you'll be performing a vulnerability scan on those systems using open Voss, and you'll also be doing some reporting at the end of the lab
00:16
again. As always on these particular labs and this course, you just want to make sure you're checking the box on the right side here as you go through the instructions. So that way, you get full credit for the lab once your complete
00:29
and if you haven't already done a little two step by step guides, be sure to do that from the resource section of the course, or you can also just follow along with the instructions on the right side of the lab itself.
Up Next
Instructed By
Similar Content