The document provides an overview of cyber security and vulnerability scanning. It discusses the history of cyber security including early computer worms like Creeper and Reaper. The CIA triad of confidentiality, integrity and availability is introduced as a model for security policies. Types of attacks and how cyber security is implemented are covered. Vulnerability scanners are defined as tools that assess vulnerabilities across systems and networks. Their benefits, limitations, architecture and types including network-based and host-based are outlined.