This document presents a training guide on vulnerability detection, covering definitions, sources, the vulnerability management cycle, and automated scanning tools. It reviews various scanners such as Nessus, OpenVAS, and Burp Suite, alongside their capabilities and applications in identifying risks and managing vulnerabilities. The document emphasizes the importance of using intelligence data collected from systems to understand and utilize discovered vulnerabilities effectively.