• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

IT & Software Scanning, Enumeration, and Vulnerabilities | Cybrary (1 Viewer)

Currently reading:
 IT & Software Scanning, Enumeration, and Vulnerabilities | Cybrary (1 Viewer)

Covers web development, programming, AI, cloud computing, DevOps, and cybersecurity.
Recently searched:

protectaccount

Member
Amateur
LV
3
Joined
Nov 21, 2025
Threads
732
Likes
61
Awards
8
Credits
15,213©
Cash
0$
amPl1fW.png

Course Description


Attackers use scanning and enumeration to determine what live systems are on the network (host discovery) and additional information about those systems, like the operating system in use and software version. With vulnerability scanning, an attacker attempts to locate specific weaknesses in system software. Specifically, the attacker is hoping to find known vulnerabilities (CVE) that they can easily exploit. This course is designed to be predominantly hands-on and covers the theory of scanning, enumeration, and vulnerabilities at a high-level.
Link:
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom