New Training: Perform a Vulnerability Scan
In this 5-video skill, CBT Nuggets trainer Shawn Powers teaches you how to scan a network for vulnerabilities. Watch this new CompTIA training.
Learn CompTIA with one of these courses:
This training includes:
- 5 videos
- 21 minutes of training
You’ll learn these topics in this skill:
- Intro to Vulnerability Scanning
- Identifying Types of Scans
- Handling Scanning Permissions
- Scanning Applications and Containers
- Scanning Considerations
Vulnerability Scanning vs Penetration Testing: How Do They Differ?
Vulnerability scanning and penetration testing are two distinct security testing strategies to expose vulnerabilities within an IT environment. Although these strategies are both designed to expose vulnerabilities and share a lot of similarities, they have uniquely differentiating characteristics.
Vulnerability scanning is an automated process that identifies and catalogs all network-attached devices and attempts to catalog the operating system and unique applications and software installed on the device. This process is intended to catalog and determine if network-attached devices are accessible.
Alternatively, penetration testing is the security testing strategy that attempts to expose vulnerabilities within an IT environment by leveraging common cyber-attack strategies.
Penetration testing goes deeper than vulnerability scanning in the sense that it uses any and all methods to expose vulnerabilities in a network. Whereas vulnerability scanning catalogs network-attached devices, notifying the use of some potential vulnerabilities based on what’s gathered when cataloging the devices.