Vulnerability assessments can save a lot of pain in the long run by picking up on flaws in systems before they become attack vectors.
In this screencast, learn how to use NeXpose Community Edition, a free collection
Requires Free Membership to View
Want more demos of free security tools? Visit our screencast page.
About the author:
Peter Giannoulis, GSEC, GCIH, GCIA, GCFA, GCFW, GREM, CISSP, is an information security
consultant in Toronto, Ontario. He currently maintains The Academy Pro, which provides streaming
video for enterprises and consumers on how to configure and troubleshoot many of today's top
security products. He also serves as a technical director for GIAC.
This was first published in August 2010
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation