SlideShare a Scribd company logo
Goal: Identify the tools and techniques to be used to scan for vulnerabilities. Procedure: List out
the tools you plan on using to perform vulnerability scanning and how you will use them.
Include both Tenable Nessus and OpenVAS. Remember to include tools designed to look for
vulnerabilities within specific technologies or platforms, such as Cisco devices, remote access
services, and web applications (e.g., Burp Suite). Follow the same documentation procedure you
performed in the previous step. Include screenshots of such tools showing configuration options
and settings. Finally, list the pros and cons of each tool. Deliverable: Provide a minimum 2-page
description of the tools you plan on using for the vulnerability scans, how you will use them,
screenshots of the tools with configuration options and settings, and the pros and cons of each
tool. Deliverable should cover at least 5 tools.

More Related Content

DOCX
Methodology and literature Survey (1).docx
PDF
Phase 2. Identify Targets and Run Scans Goal Identify the tools and.pdf
PPTX
A bug reconnaissance tool is typically software or a system used by cybersecu...
PDF
Software for Finding vulnerabilities in programs.pdf
PPTX
Vulnerability Assesment
PPTX
Cyber Security Penetration Testing Tools
PPTX
Cyber Security Hacking and Attack Tree Analysis
PDF
NSA and PT
Methodology and literature Survey (1).docx
Phase 2. Identify Targets and Run Scans Goal Identify the tools and.pdf
A bug reconnaissance tool is typically software or a system used by cybersecu...
Software for Finding vulnerabilities in programs.pdf
Vulnerability Assesment
Cyber Security Penetration Testing Tools
Cyber Security Hacking and Attack Tree Analysis
NSA and PT

Similar to Goal- Identify the tools and techniques to be used to scan for vulnera.pdf (18)

PPT
List of Penetration Testing Tools -.ppt
PPTX
FALCON.pptx
PPTX
Vulnerability Assessment and Penetration testing
PDF
Vulnerability Scanning Techniques and Vulnerability scores & exposures
PDF
Network Vulnerability and Patching
PPTX
Webinar On Ethical Hacking & Cybersecurity - Day2
PPTX
VAPT document for begineer - VAPT document for begineer
PDF
DevSecOps: Essential Tooling to Enable Continuous Security(25m ADDO)
PDF
Types of Vulnerability Scanning An in depth investigation.pdf
PDF
IT Vulnerability & Tools Watch 2011
PPTX
Penetration Testing vs. Vulnerability Scanning
PPTX
Vulnerability assessment and penetration testing
PPTX
Penetration testing dont just leave it to chance
PDF
Nt2580 Unit 7 Chapter 12
PDF
Vulnerability scanning report by Tareq Hanaysha
PDF
Vulnerability assessment-info-savvy
PDF
Benchmarking our Network Vulnerability Scanner
PPT
Ethical hacking
List of Penetration Testing Tools -.ppt
FALCON.pptx
Vulnerability Assessment and Penetration testing
Vulnerability Scanning Techniques and Vulnerability scores & exposures
Network Vulnerability and Patching
Webinar On Ethical Hacking & Cybersecurity - Day2
VAPT document for begineer - VAPT document for begineer
DevSecOps: Essential Tooling to Enable Continuous Security(25m ADDO)
Types of Vulnerability Scanning An in depth investigation.pdf
IT Vulnerability & Tools Watch 2011
Penetration Testing vs. Vulnerability Scanning
Vulnerability assessment and penetration testing
Penetration testing dont just leave it to chance
Nt2580 Unit 7 Chapter 12
Vulnerability scanning report by Tareq Hanaysha
Vulnerability assessment-info-savvy
Benchmarking our Network Vulnerability Scanner
Ethical hacking
Ad

More from aaicommunication34 (20)

PDF
Government funding- The following table presents the budget (in milion.pdf
PDF
Government programs during the New Deal revealed institutional racism.pdf
PDF
govering tw putilc aerica ham any polbeal nhiturise acpleatos gowh and.pdf
PDF
Googlet- has a built-in targeting mechanism with its circles- allowed.pdf
PDF
Glucose uptake (nmolmg1h1).pdf
PDF
Good day- I'm posting this question again but not as a picture because.pdf
PDF
Gone acpandage ostinging cell found in Cnidarians free-swimming or flo.pdf
PDF
Goal- Your goal in this assignment is to write a Java program that sim.pdf
PDF
Glycolysis is the process by which is oxidized into The TCA cycle is t.pdf
PDF
Glycolysis- the TCA or Krebs Cycle- and the electron transport system.pdf
PDF
Given the probabilities of two independent events- P(A)-0-12P(B)-0-22.pdf
PDF
Given the header of a method public static String m1 (double num1- cha.pdf
PDF
Given the utility function U(X-Y)-XY- Abby consumes X-4 and Y-9- her M.pdf
PDF
Given the utility function U(X-Y)-XY- Abby consumes X-2 and Y-7- her M.pdf
PDF
Globalisation is the process by which businesses develop international.pdf
PDF
Gloria Chu- a general manager at the MotoX Corporation- wants all of h.pdf
PDF
Globalization has led to a- increasing loyalty of customers for produc.pdf
PDF
GKC- CPA expressed an adverse opinion on the operating effectiveness o.pdf
PDF
Given the probability density function f(x)-2x-3 for 0x3- derive the e.pdf
PDF
HANDOUT 7-3 Filling in the Blanks Write letters in the blanks to compl.pdf
Government funding- The following table presents the budget (in milion.pdf
Government programs during the New Deal revealed institutional racism.pdf
govering tw putilc aerica ham any polbeal nhiturise acpleatos gowh and.pdf
Googlet- has a built-in targeting mechanism with its circles- allowed.pdf
Glucose uptake (nmolmg1h1).pdf
Good day- I'm posting this question again but not as a picture because.pdf
Gone acpandage ostinging cell found in Cnidarians free-swimming or flo.pdf
Goal- Your goal in this assignment is to write a Java program that sim.pdf
Glycolysis is the process by which is oxidized into The TCA cycle is t.pdf
Glycolysis- the TCA or Krebs Cycle- and the electron transport system.pdf
Given the probabilities of two independent events- P(A)-0-12P(B)-0-22.pdf
Given the header of a method public static String m1 (double num1- cha.pdf
Given the utility function U(X-Y)-XY- Abby consumes X-4 and Y-9- her M.pdf
Given the utility function U(X-Y)-XY- Abby consumes X-2 and Y-7- her M.pdf
Globalisation is the process by which businesses develop international.pdf
Gloria Chu- a general manager at the MotoX Corporation- wants all of h.pdf
Globalization has led to a- increasing loyalty of customers for produc.pdf
GKC- CPA expressed an adverse opinion on the operating effectiveness o.pdf
Given the probability density function f(x)-2x-3 for 0x3- derive the e.pdf
HANDOUT 7-3 Filling in the Blanks Write letters in the blanks to compl.pdf
Ad

Recently uploaded (20)

PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Computing-Curriculum for Schools in Ghana
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Presentation on HIE in infants and its manifestations
PDF
RMMM.pdf make it easy to upload and study
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
master seminar digital applications in india
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Cell Types and Its function , kingdom of life
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Lesson notes of climatology university.
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Classroom Observation Tools for Teachers
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Supply Chain Operations Speaking Notes -ICLT Program
Computing-Curriculum for Schools in Ghana
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Pharma ospi slides which help in ospi learning
Presentation on HIE in infants and its manifestations
RMMM.pdf make it easy to upload and study
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
human mycosis Human fungal infections are called human mycosis..pptx
GDM (1) (1).pptx small presentation for students
master seminar digital applications in india
O7-L3 Supply Chain Operations - ICLT Program
Cell Types and Its function , kingdom of life
VCE English Exam - Section C Student Revision Booklet
Lesson notes of climatology university.
A systematic review of self-coping strategies used by university students to ...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Classroom Observation Tools for Teachers
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx

Goal- Identify the tools and techniques to be used to scan for vulnera.pdf

  • 1. Goal: Identify the tools and techniques to be used to scan for vulnerabilities. Procedure: List out the tools you plan on using to perform vulnerability scanning and how you will use them. Include both Tenable Nessus and OpenVAS. Remember to include tools designed to look for vulnerabilities within specific technologies or platforms, such as Cisco devices, remote access services, and web applications (e.g., Burp Suite). Follow the same documentation procedure you performed in the previous step. Include screenshots of such tools showing configuration options and settings. Finally, list the pros and cons of each tool. Deliverable: Provide a minimum 2-page description of the tools you plan on using for the vulnerability scans, how you will use them, screenshots of the tools with configuration options and settings, and the pros and cons of each tool. Deliverable should cover at least 5 tools.