To conclude, a Network Vulnerability Scan is a three-phase process including discovery, port scanning, and vulnerability scanning. This, if performed correctly, will help an organization to identify its current security posture and create actionable solutions in order to improve this posture. We have seen the steps to plan a Network Vulnerability Scan in this chapter and the various factors that are involved. In further chapters, we will look into the tutorials on how to perform this Network Vulnerability Scan to identify the vulnerabilities and act on them.
-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Network Scanning Cookbook
By :

Network Scanning Cookbook
By:
Overview of this book
Network scanning is a discipline of network security that identifies active hosts on networks and determining whether there are any vulnerabilities that could be exploited. Nessus and Nmap are among the top tools that enable you to scan your network for vulnerabilities and open ports, which can be used as back doors into a network.
Network Scanning Cookbook contains recipes for configuring these tools in your infrastructure that get you started with scanning ports, services, and devices in your network. As you progress through the chapters, you will learn how to carry out various key scanning tasks, such as firewall detection, OS detection, and access management, and will look at problems related to vulnerability scanning and exploitation in the network. The book also contains recipes for assessing remote services and the security risks that they bring to a network infrastructure.
By the end of the book, you will be familiar with industry-grade tools for network scanning, and techniques for vulnerability scanning and network protection.
Table of Contents (10 chapters)
Preface
Introduction to Network Vulnerability Scanning
Understanding Network Scanning Tools
Port Scanning
Vulnerability Scanning
Configuration Audits
Report Analysis and Confirmation
Understanding the Customization and Optimization of Nessus and Nmap
Network Scanning for IoT, SCADA/ICS
Other Books You May Enjoy
Customer Reviews