- Network Scanning Cookbook
- Sairam Jetty
- 219字
- 2021-08-13 15:14:17
Introduction to Network Vulnerability Scanning
In today's times, where hackers are prevalent and there are critical vulnerabilities discovered in various products every day, corporate networks are required to create procedures to identify, analyze, and mitigate vulnerabilities in real time. In this cookbook, we will be looking into various procedures and tools required to perform network security scanning and to understand and act on the results obtained.
This cookbook will equip any reader with a basic knowledge of computer networks with recipes to prepare, plan, and execute a Network Vulnerability Scan and determine the targets for a penetration test, or just to understand the security posture of the network. This will help budding penetration testers to conquer and learn to cook their methods to perform preliminary steps to identify vulnerabilities.
This chapter will introduce you to the basics of computer networks. It also dives into the procedures, uses, and various complexities to consider while performing a Network Vulnerability Scan. This chapter will equip you with basic knowledge of how to plan a Network Vulnerability Scan.
In this chapter, we will cover the following:
- Basic networks and their components
- Network Vulnerability Scanning
- Flow of procedures used in Network Vulnerability Scanning
- Uses of performing a Network Vulnerability Scan
- Complexity of performing network scans
- How to devise a mitigation plan and respond
- 飛利浦/JVC新型彩色電視機速修圖解
- Mentor PADS VX2.7(中文版)電子設(shè)計速成實戰(zhàn)寶典
- 天線測量實用手冊(第2版)
- 華為路由器學(xué)習(xí)指南
- 電子產(chǎn)品設(shè)計原理與應(yīng)用
- 大話移動通信
- 路由技術(shù)(IPv4版)
- Network Programming with Rust
- 基于加權(quán)多維標度的無線信號定位理論與方法
- 5G標準之網(wǎng)絡(luò)架構(gòu):構(gòu)建萬物互聯(lián)的智能世界(5G新技術(shù)叢書)
- 數(shù)據(jù)虛擬化:多源異構(gòu)數(shù)據(jù)集成之道
- Cloud-Native Applications in Java
- cdma2000 1x EV-DO系統(tǒng)、接口與無線網(wǎng)絡(luò)優(yōu)化
- Protel DXP 2004入門與提高
- BREW進階與精通