From the course: Vulnerability Management in Cybersecurity: The Basics
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Introduction to vulnerability scanning
From the course: Vulnerability Management in Cybersecurity: The Basics
Introduction to vulnerability scanning
- [Narrator] You might be wondering, how on earth do you detect vulnerabilities? Several companies have developed commercially available software that analyzes systems to look for the presence of vulnerabilities that are listed in the national vulnerability database, NVD, and common vulnerabilities and exposures, CVE. These applications are called vulnerability scan engines and they perform what are frequently called vulnerability checks, but vendors may use different terms. Some of the big names in this space are Qualys, Rapid7 and Tenable. And some of these companies even have community versions that you can download and use for free on your home network. A vulnerability scan can assess a single computer, a group of computers on a network, or the entire network. That includes other non-computer things like routers, switches, printers, or anything else that's connected to your network, including IOT devices like smart…