SlideShare a Scribd company logo
Goal: Identify the tools and techniques to be used to scan for vulnerabilities. Procedure: List out
the tools you plan on using to perform vulnerability scanning and how you will use them.
Include both Tenable Nessus and OpenVAS. Remember to include tools designed to look for
vulnerabilities within specific technologies or platforms, such as Cisco devices, remote access
services, and web applications (e.g., Burp Suite). Follow the same documentation procedure you
performed in the previous step. Include screenshots of such tools showing configuration options
and settings. Finally, list the pros and cons of each tool. Deliverable: Provide a minimum 2-page
description of the tools you plan on using for the vulnerability scans, how you will use them,
screenshots of the tools with configuration options and settings, and the pros and cons of each
tool. Deliverable should cover at least 5 tools.

More Related Content

Similar to Goal- Identify the tools and techniques to be used to scan for vulnera.pdf

Nessus
NessusNessus
Nessus Software
Nessus SoftwareNessus Software
Nessus Software
Megha Sahu
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
Pooja Bhojwani
 
Software for Finding vulnerabilities in programs.pdf
Software for Finding vulnerabilities in programs.pdfSoftware for Finding vulnerabilities in programs.pdf
Software for Finding vulnerabilities in programs.pdf
Bytecode Security
 
AssignmentPrepare a vulnerability scanning report that will be pre.pdf
AssignmentPrepare a vulnerability scanning report that will be pre.pdfAssignmentPrepare a vulnerability scanning report that will be pre.pdf
AssignmentPrepare a vulnerability scanning report that will be pre.pdf
tsekar2004
 
Nessus is a network security tool- write a pragraph describe itsto.pdf
Nessus is a network security tool- write a pragraph describe itsto.pdfNessus is a network security tool- write a pragraph describe itsto.pdf
Nessus is a network security tool- write a pragraph describe itsto.pdf
fazilfootsteps
 
Sd Revision
Sd RevisionSd Revision
Sd Revision
mrsmackenzie
 
SECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONS
SECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONSSECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONS
SECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONS
ijseajournal
 
A Penetration Tester evaluates the security of an information infras.docx
A Penetration Tester evaluates the security of an information infras.docxA Penetration Tester evaluates the security of an information infras.docx
A Penetration Tester evaluates the security of an information infras.docx
sleeperharwell
 
Nessus is a network security toolIn a pragraph describe the tool’s.pdf
Nessus is a network security toolIn a pragraph describe the tool’s.pdfNessus is a network security toolIn a pragraph describe the tool’s.pdf
Nessus is a network security toolIn a pragraph describe the tool’s.pdf
aminbijal86
 
Create software that can encrypt and decrypt using S-DES- Test data- u.docx
Create software that can encrypt and decrypt using S-DES- Test data- u.docxCreate software that can encrypt and decrypt using S-DES- Test data- u.docx
Create software that can encrypt and decrypt using S-DES- Test data- u.docx
CharlesXMLAllano
 
Non functional requirement
Non functional requirementNon functional requirement
Non functional requirementGetacher Zewudie
 
Introduction to Exploitation
Introduction to ExploitationIntroduction to Exploitation
Introduction to Exploitation
primeteacher32
 
Computer Software
Computer SoftwareComputer Software
Computer Software
racel92gorres
 
Maven.pptx
Maven.pptxMaven.pptx
Maven.pptx
piyushkumar613397
 
2 software
2 software2 software
2 software
Veeresh Khelgi
 
Owasp methodologies of Security testing part1
Owasp methodologies of Security testing part1Owasp methodologies of Security testing part1
Owasp methodologies of Security testing part1
robin_bene
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri
 

Similar to Goal- Identify the tools and techniques to be used to scan for vulnera.pdf (20)

Nessus
NessusNessus
Nessus
 
Nessus Software
Nessus SoftwareNessus Software
Nessus Software
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
Software for Finding vulnerabilities in programs.pdf
Software for Finding vulnerabilities in programs.pdfSoftware for Finding vulnerabilities in programs.pdf
Software for Finding vulnerabilities in programs.pdf
 
AssignmentPrepare a vulnerability scanning report that will be pre.pdf
AssignmentPrepare a vulnerability scanning report that will be pre.pdfAssignmentPrepare a vulnerability scanning report that will be pre.pdf
AssignmentPrepare a vulnerability scanning report that will be pre.pdf
 
Nessus is a network security tool- write a pragraph describe itsto.pdf
Nessus is a network security tool- write a pragraph describe itsto.pdfNessus is a network security tool- write a pragraph describe itsto.pdf
Nessus is a network security tool- write a pragraph describe itsto.pdf
 
Sd Revision
Sd RevisionSd Revision
Sd Revision
 
SECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONS
SECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONSSECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONS
SECURITY FOR DEVOPS DEPLOYMENT PROCESSES: DEFENSES, RISKS, RESEARCH DIRECTIONS
 
A Penetration Tester evaluates the security of an information infras.docx
A Penetration Tester evaluates the security of an information infras.docxA Penetration Tester evaluates the security of an information infras.docx
A Penetration Tester evaluates the security of an information infras.docx
 
Nessus is a network security toolIn a pragraph describe the tool’s.pdf
Nessus is a network security toolIn a pragraph describe the tool’s.pdfNessus is a network security toolIn a pragraph describe the tool’s.pdf
Nessus is a network security toolIn a pragraph describe the tool’s.pdf
 
ShwetaKBijay-resume
ShwetaKBijay-resumeShwetaKBijay-resume
ShwetaKBijay-resume
 
Create software that can encrypt and decrypt using S-DES- Test data- u.docx
Create software that can encrypt and decrypt using S-DES- Test data- u.docxCreate software that can encrypt and decrypt using S-DES- Test data- u.docx
Create software that can encrypt and decrypt using S-DES- Test data- u.docx
 
Non functional requirement
Non functional requirementNon functional requirement
Non functional requirement
 
Introduction to Exploitation
Introduction to ExploitationIntroduction to Exploitation
Introduction to Exploitation
 
Computer Software
Computer SoftwareComputer Software
Computer Software
 
Android by Swecha
Android by SwechaAndroid by Swecha
Android by Swecha
 
Maven.pptx
Maven.pptxMaven.pptx
Maven.pptx
 
2 software
2 software2 software
2 software
 
Owasp methodologies of Security testing part1
Owasp methodologies of Security testing part1Owasp methodologies of Security testing part1
Owasp methodologies of Security testing part1
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
 

More from aaicommunication34

Government funding- The following table presents the budget (in milion.pdf
Government funding- The following table presents the budget (in milion.pdfGovernment funding- The following table presents the budget (in milion.pdf
Government funding- The following table presents the budget (in milion.pdf
aaicommunication34
 
Government programs during the New Deal revealed institutional racism.pdf
Government programs during the New Deal revealed institutional racism.pdfGovernment programs during the New Deal revealed institutional racism.pdf
Government programs during the New Deal revealed institutional racism.pdf
aaicommunication34
 
govering tw putilc aerica ham any polbeal nhiturise acpleatos gowh and.pdf
govering tw putilc aerica ham any polbeal nhiturise acpleatos gowh and.pdfgovering tw putilc aerica ham any polbeal nhiturise acpleatos gowh and.pdf
govering tw putilc aerica ham any polbeal nhiturise acpleatos gowh and.pdf
aaicommunication34
 
Googlet- has a built-in targeting mechanism with its circles- allowed.pdf
Googlet- has a built-in targeting mechanism with its circles- allowed.pdfGooglet- has a built-in targeting mechanism with its circles- allowed.pdf
Googlet- has a built-in targeting mechanism with its circles- allowed.pdf
aaicommunication34
 
Glucose uptake (nmolmg1h1).pdf
Glucose uptake (nmolmg1h1).pdfGlucose uptake (nmolmg1h1).pdf
Glucose uptake (nmolmg1h1).pdf
aaicommunication34
 
Good day- I'm posting this question again but not as a picture because.pdf
Good day- I'm posting this question again but not as a picture because.pdfGood day- I'm posting this question again but not as a picture because.pdf
Good day- I'm posting this question again but not as a picture because.pdf
aaicommunication34
 
Gone acpandage ostinging cell found in Cnidarians free-swimming or flo.pdf
Gone acpandage ostinging cell found in Cnidarians free-swimming or flo.pdfGone acpandage ostinging cell found in Cnidarians free-swimming or flo.pdf
Gone acpandage ostinging cell found in Cnidarians free-swimming or flo.pdf
aaicommunication34
 
Goal- Your goal in this assignment is to write a Java program that sim.pdf
Goal- Your goal in this assignment is to write a Java program that sim.pdfGoal- Your goal in this assignment is to write a Java program that sim.pdf
Goal- Your goal in this assignment is to write a Java program that sim.pdf
aaicommunication34
 
Glycolysis is the process by which is oxidized into The TCA cycle is t.pdf
Glycolysis is the process by which is oxidized into The TCA cycle is t.pdfGlycolysis is the process by which is oxidized into The TCA cycle is t.pdf
Glycolysis is the process by which is oxidized into The TCA cycle is t.pdf
aaicommunication34
 
Glycolysis- the TCA or Krebs Cycle- and the electron transport system.pdf
Glycolysis- the TCA or Krebs Cycle- and the electron transport system.pdfGlycolysis- the TCA or Krebs Cycle- and the electron transport system.pdf
Glycolysis- the TCA or Krebs Cycle- and the electron transport system.pdf
aaicommunication34
 
Given the probabilities of two independent events- P(A)-0-12P(B)-0-22.pdf
Given the probabilities of two independent events- P(A)-0-12P(B)-0-22.pdfGiven the probabilities of two independent events- P(A)-0-12P(B)-0-22.pdf
Given the probabilities of two independent events- P(A)-0-12P(B)-0-22.pdf
aaicommunication34
 
Given the header of a method public static String m1 (double num1- cha.pdf
Given the header of a method public static String m1 (double num1- cha.pdfGiven the header of a method public static String m1 (double num1- cha.pdf
Given the header of a method public static String m1 (double num1- cha.pdf
aaicommunication34
 
Given the utility function U(X-Y)-XY- Abby consumes X-4 and Y-9- her M.pdf
Given the utility function U(X-Y)-XY- Abby consumes X-4 and Y-9- her M.pdfGiven the utility function U(X-Y)-XY- Abby consumes X-4 and Y-9- her M.pdf
Given the utility function U(X-Y)-XY- Abby consumes X-4 and Y-9- her M.pdf
aaicommunication34
 
Given the utility function U(X-Y)-XY- Abby consumes X-2 and Y-7- her M.pdf
Given the utility function U(X-Y)-XY- Abby consumes X-2 and Y-7- her M.pdfGiven the utility function U(X-Y)-XY- Abby consumes X-2 and Y-7- her M.pdf
Given the utility function U(X-Y)-XY- Abby consumes X-2 and Y-7- her M.pdf
aaicommunication34
 
Globalisation is the process by which businesses develop international.pdf
Globalisation is the process by which businesses develop international.pdfGlobalisation is the process by which businesses develop international.pdf
Globalisation is the process by which businesses develop international.pdf
aaicommunication34
 
Gloria Chu- a general manager at the MotoX Corporation- wants all of h.pdf
Gloria Chu- a general manager at the MotoX Corporation- wants all of h.pdfGloria Chu- a general manager at the MotoX Corporation- wants all of h.pdf
Gloria Chu- a general manager at the MotoX Corporation- wants all of h.pdf
aaicommunication34
 
Globalization has led to a- increasing loyalty of customers for produc.pdf
Globalization has led to a- increasing loyalty of customers for produc.pdfGlobalization has led to a- increasing loyalty of customers for produc.pdf
Globalization has led to a- increasing loyalty of customers for produc.pdf
aaicommunication34
 
GKC- CPA expressed an adverse opinion on the operating effectiveness o.pdf
GKC- CPA expressed an adverse opinion on the operating effectiveness o.pdfGKC- CPA expressed an adverse opinion on the operating effectiveness o.pdf
GKC- CPA expressed an adverse opinion on the operating effectiveness o.pdf
aaicommunication34
 
Given the probability density function f(x)-2x-3 for 0x3- derive the e.pdf
Given the probability density function f(x)-2x-3 for 0x3- derive the e.pdfGiven the probability density function f(x)-2x-3 for 0x3- derive the e.pdf
Given the probability density function f(x)-2x-3 for 0x3- derive the e.pdf
aaicommunication34
 
HANDOUT 7-3 Filling in the Blanks Write letters in the blanks to compl.pdf
HANDOUT 7-3 Filling in the Blanks Write letters in the blanks to compl.pdfHANDOUT 7-3 Filling in the Blanks Write letters in the blanks to compl.pdf
HANDOUT 7-3 Filling in the Blanks Write letters in the blanks to compl.pdf
aaicommunication34
 

More from aaicommunication34 (20)

Government funding- The following table presents the budget (in milion.pdf
Government funding- The following table presents the budget (in milion.pdfGovernment funding- The following table presents the budget (in milion.pdf
Government funding- The following table presents the budget (in milion.pdf
 
Government programs during the New Deal revealed institutional racism.pdf
Government programs during the New Deal revealed institutional racism.pdfGovernment programs during the New Deal revealed institutional racism.pdf
Government programs during the New Deal revealed institutional racism.pdf
 
govering tw putilc aerica ham any polbeal nhiturise acpleatos gowh and.pdf
govering tw putilc aerica ham any polbeal nhiturise acpleatos gowh and.pdfgovering tw putilc aerica ham any polbeal nhiturise acpleatos gowh and.pdf
govering tw putilc aerica ham any polbeal nhiturise acpleatos gowh and.pdf
 
Googlet- has a built-in targeting mechanism with its circles- allowed.pdf
Googlet- has a built-in targeting mechanism with its circles- allowed.pdfGooglet- has a built-in targeting mechanism with its circles- allowed.pdf
Googlet- has a built-in targeting mechanism with its circles- allowed.pdf
 
Glucose uptake (nmolmg1h1).pdf
Glucose uptake (nmolmg1h1).pdfGlucose uptake (nmolmg1h1).pdf
Glucose uptake (nmolmg1h1).pdf
 
Good day- I'm posting this question again but not as a picture because.pdf
Good day- I'm posting this question again but not as a picture because.pdfGood day- I'm posting this question again but not as a picture because.pdf
Good day- I'm posting this question again but not as a picture because.pdf
 
Gone acpandage ostinging cell found in Cnidarians free-swimming or flo.pdf
Gone acpandage ostinging cell found in Cnidarians free-swimming or flo.pdfGone acpandage ostinging cell found in Cnidarians free-swimming or flo.pdf
Gone acpandage ostinging cell found in Cnidarians free-swimming or flo.pdf
 
Goal- Your goal in this assignment is to write a Java program that sim.pdf
Goal- Your goal in this assignment is to write a Java program that sim.pdfGoal- Your goal in this assignment is to write a Java program that sim.pdf
Goal- Your goal in this assignment is to write a Java program that sim.pdf
 
Glycolysis is the process by which is oxidized into The TCA cycle is t.pdf
Glycolysis is the process by which is oxidized into The TCA cycle is t.pdfGlycolysis is the process by which is oxidized into The TCA cycle is t.pdf
Glycolysis is the process by which is oxidized into The TCA cycle is t.pdf
 
Glycolysis- the TCA or Krebs Cycle- and the electron transport system.pdf
Glycolysis- the TCA or Krebs Cycle- and the electron transport system.pdfGlycolysis- the TCA or Krebs Cycle- and the electron transport system.pdf
Glycolysis- the TCA or Krebs Cycle- and the electron transport system.pdf
 
Given the probabilities of two independent events- P(A)-0-12P(B)-0-22.pdf
Given the probabilities of two independent events- P(A)-0-12P(B)-0-22.pdfGiven the probabilities of two independent events- P(A)-0-12P(B)-0-22.pdf
Given the probabilities of two independent events- P(A)-0-12P(B)-0-22.pdf
 
Given the header of a method public static String m1 (double num1- cha.pdf
Given the header of a method public static String m1 (double num1- cha.pdfGiven the header of a method public static String m1 (double num1- cha.pdf
Given the header of a method public static String m1 (double num1- cha.pdf
 
Given the utility function U(X-Y)-XY- Abby consumes X-4 and Y-9- her M.pdf
Given the utility function U(X-Y)-XY- Abby consumes X-4 and Y-9- her M.pdfGiven the utility function U(X-Y)-XY- Abby consumes X-4 and Y-9- her M.pdf
Given the utility function U(X-Y)-XY- Abby consumes X-4 and Y-9- her M.pdf
 
Given the utility function U(X-Y)-XY- Abby consumes X-2 and Y-7- her M.pdf
Given the utility function U(X-Y)-XY- Abby consumes X-2 and Y-7- her M.pdfGiven the utility function U(X-Y)-XY- Abby consumes X-2 and Y-7- her M.pdf
Given the utility function U(X-Y)-XY- Abby consumes X-2 and Y-7- her M.pdf
 
Globalisation is the process by which businesses develop international.pdf
Globalisation is the process by which businesses develop international.pdfGlobalisation is the process by which businesses develop international.pdf
Globalisation is the process by which businesses develop international.pdf
 
Gloria Chu- a general manager at the MotoX Corporation- wants all of h.pdf
Gloria Chu- a general manager at the MotoX Corporation- wants all of h.pdfGloria Chu- a general manager at the MotoX Corporation- wants all of h.pdf
Gloria Chu- a general manager at the MotoX Corporation- wants all of h.pdf
 
Globalization has led to a- increasing loyalty of customers for produc.pdf
Globalization has led to a- increasing loyalty of customers for produc.pdfGlobalization has led to a- increasing loyalty of customers for produc.pdf
Globalization has led to a- increasing loyalty of customers for produc.pdf
 
GKC- CPA expressed an adverse opinion on the operating effectiveness o.pdf
GKC- CPA expressed an adverse opinion on the operating effectiveness o.pdfGKC- CPA expressed an adverse opinion on the operating effectiveness o.pdf
GKC- CPA expressed an adverse opinion on the operating effectiveness o.pdf
 
Given the probability density function f(x)-2x-3 for 0x3- derive the e.pdf
Given the probability density function f(x)-2x-3 for 0x3- derive the e.pdfGiven the probability density function f(x)-2x-3 for 0x3- derive the e.pdf
Given the probability density function f(x)-2x-3 for 0x3- derive the e.pdf
 
HANDOUT 7-3 Filling in the Blanks Write letters in the blanks to compl.pdf
HANDOUT 7-3 Filling in the Blanks Write letters in the blanks to compl.pdfHANDOUT 7-3 Filling in the Blanks Write letters in the blanks to compl.pdf
HANDOUT 7-3 Filling in the Blanks Write letters in the blanks to compl.pdf
 

Recently uploaded

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 

Goal- Identify the tools and techniques to be used to scan for vulnera.pdf

  • 1. Goal: Identify the tools and techniques to be used to scan for vulnerabilities. Procedure: List out the tools you plan on using to perform vulnerability scanning and how you will use them. Include both Tenable Nessus and OpenVAS. Remember to include tools designed to look for vulnerabilities within specific technologies or platforms, such as Cisco devices, remote access services, and web applications (e.g., Burp Suite). Follow the same documentation procedure you performed in the previous step. Include screenshots of such tools showing configuration options and settings. Finally, list the pros and cons of each tool. Deliverable: Provide a minimum 2-page description of the tools you plan on using for the vulnerability scans, how you will use them, screenshots of the tools with configuration options and settings, and the pros and cons of each tool. Deliverable should cover at least 5 tools.