Vulnerability Scanning Intro (part 1)
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:04
All right, so let's move on to vulnerability identification. We didn't find
00:09
potential vulnerabilities in some cases just from our map scanning in the previous section. But now we're going to actually start verifying vulnerabilities and find some additional ones, but we can exploit them when we get the exploitation.
Up Next
Similar Content