10 hours 25 minutes
everyone welcome back to the core. So in this particular lab, you're gonna be using end map. You're also going to be taking a look at the Splunk server and just see what kind of resources were used on there. And then you'll also be taking a look at what's been happening on a window system. So you're gonna look at some of the logs there as well.
So the tool you're gonna be using in this particular lab is gonna be end map specifically,
and you'll be able to find different vulnerabilities in this and these particular systems. And as with all of the labs
in the series of this course, you want to make sure that you're checking these boxes as you go through the instructions to make sure you get full credit. And if you haven't done it already, be sure to download the step by step guide. That's in the resource is section of the course
Fundamentals of Vulnerability Management
Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.