April 2017
Intermediate to advanced
512 pages
7h 59m
English
The goal is to ensure that the systems in the network are identified with their vulnerabilities and that these are mitigated so that future attacks do not take place over those known vulnerabilities, and also to ensure that every device in the network is identified along with its open ports and flaws.
Read now
Unlock full access