www.howtonetwork.org

CCNA & CCNP Certifcation Training

  • About
  • Contact
  • FAQ
  • Join
  • Home
  • CCNA
    • ICND1
    • ICND2
    • 101 CCNA LABS
  • CCNP
    • ROUTE
    • SWITCH
    • TSHOOT
    • 101 CCNP LABS
  • CompTIA
    • Security+
    • Network+
  • Design
    • CCDA
    • CCDP
You are here: Home / CompTIA / Security+ / Chapter 3: Threats and Vulnerabilities / Proper Use of Penetration Testing versus Vulnerability Scanning

Proper Use of Penetration Testing versus Vulnerability Scanning

Knowing all these threats are out there is merely one-half of solving the threats and vulnerabilities equation. The other half is knowing how to test your network for vulnerabilities. This section will cover the following topics:

  • Penetration testing
  • Vulnerability scanning
  • Black box
  • White box
  • Gray box

 

Penetration Testing

A properly configured network in terms of accessibility is a good thing. A properly configured network in terms of security is a priceless asset every company hopes to have. It is possible to test your network and see . . .

The content below this message is for members only.

About Us

This is a free bonus site for members of www.howtonetwork.com

Copyright

The content on this copyright Reality Press Ltd.
Copyright Reality Press Ltd.