Scanning, Enumeration, and Vulnerabilities | Cybrary

protectaccount

protectaccount

Hero Member
Joined
December 27, 2025
Messages
676
Reaction score
994
Points
93
amPl1fW.png

Course Description



Attackers use scanning and enumeration to determine what live systems are on the network (host discovery) and additional information about those systems, like the operating system in use and software version. With vulnerability scanning, an attacker attempts to locate specific weaknesses in system software. Specifically, the attacker is hoping to find known vulnerabilities (CVE) that they can easily exploit. This course is designed to be predominantly hands-on and covers the theory of scanning, enumeration, and vulnerabilities at a high-level.

To see this hidden content, you must reply and react with one of the following reactions : Like Like
 
  • Tags
    cybrary scanning vulnerabilities
  • Top