Security School

Manage Learn to apply best practices and optimize your operations.

Performing an authenticated vulnerability scan

Kevin Beaver explains why authenticated vulnerability scans matter and how to add them to your enterprise vulnerability assessment program.

Introduction

Running vulnerability assessments and scans are critical enterprises practices that will help security teams not only find weaknesses and points of failure but also ensure the correct patches and updates are made.

While many organizations perform vulnerability scans, they often only run external or unauthenticated scans, omitting the other side of the vulnerability scanning equation: authenticated vulnerability scans.

This Security School lesson featuring information security expert Kevin Beaver offers guidance on how to perform an authenticated vulnerability scan to complete your vulnerability management program, as well as the truths behind many authenticated vulnerability scanning misconceptions.

Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned. Passing the quiz earns you one CPE credit from (ISC)².

View our Security School Course Catalog to view more lessons eligible for CPE credits.

About the presenter: Kevin Beaver is an information security consultant, writer, professional, speaker and expert witness with Atlanta-based Principle Logic LLC. With more than 25 years of experience in the industry, Kevin specializes in performing independent security vulnerability assessments of network systems, as well as Web and mobile applications.

1Learning links-

Authenticated vulnerability scanning tips and tricks

Authenticated vulnerability scans are integral components of an enterprise vulnerability management program, yet many organizations are not using them. In the following three lessons, information security expert Kevin Beaver discusses the importance of authenticated vulnerability scans, explains how to improve the scanning process, debunks several myths and misunderstanding, and much more.

Video

The gaping hole in your vulnerability management program

Authenticated vulnerability scanning may be just what your organization needs to complete its vulnerability management program. In this video, expert Kevin Beaver offers pointers for performing an authenticated vulnerability scan. Continue Reading

Tip

Five steps for improving an authenticated vulnerability scan

Running an authenticated vulnerability scan can help detect flaws in your system, yet many organizations don't invest in this methodology. Security expert Kevin Beaver discusses five ways to get the most out of an authenticated vulnerability scan. Continue Reading

Podcast

Debunking the myths of authenticated vulnerability scans

When it comes to authenticated vulnerability scans, there are many misunderstandings about the technology that leave organizations wary. Security expert Kevin Beaver explains what to expect from your scans. Continue Reading

2Quiz-

Test your authenticated vulnerability scanning knowledge

After watching the video, reading the tip and listening to the podcast, test what you've learned about authenticated vulnerability scanning with this exclusive quiz.

Take This Quiz

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close