Running vulnerability assessments and scans are critical enterprises practices that will help security teams not only find weaknesses and points of failure but also ensure the correct patches and updates are made.
While many organizations perform vulnerability scans, they often only run external or unauthenticated scans, omitting the other side of the vulnerability scanning equation: authenticated vulnerability scans.
This Security School lesson featuring information security expert Kevin Beaver offers guidance on how to perform an authenticated vulnerability scan to complete your vulnerability management program, as well as the truths behind many authenticated vulnerability scanning misconceptions.
Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned. Passing the quiz earns you one CPE credit from (ISC)².
View our Security School Course Catalog to view more lessons eligible for CPE credits.
About the presenter: Kevin Beaver is an information security consultant, writer, professional, speaker and expert witness with Atlanta-based Principle Logic LLC. With more than 25 years of experience in the industry, Kevin specializes in performing independent security vulnerability assessments of network systems, as well as Web and mobile applications.
Authenticated vulnerability scanning tips and tricks
Authenticated vulnerability scans are integral components of an enterprise vulnerability management program, yet many organizations are not using them. In the following three lessons, information security expert Kevin Beaver discusses the importance of authenticated vulnerability scans, explains how to improve the scanning process, debunks several myths and misunderstanding, and much more.
Authenticated vulnerability scanning may be just what your organization needs to complete its vulnerability management program. In this video, expert Kevin Beaver offers pointers for performing an authenticated vulnerability scan. Continue Reading
Running an authenticated vulnerability scan can help detect flaws in your system, yet many organizations don't invest in this methodology. Security expert Kevin Beaver discusses five ways to get the most out of an authenticated vulnerability scan. Continue Reading
When it comes to authenticated vulnerability scans, there are many misunderstandings about the technology that leave organizations wary. Security expert Kevin Beaver explains what to expect from your scans. Continue Reading
Test your authenticated vulnerability scanning knowledge
After watching the video, reading the tip and listening to the podcast, test what you've learned about authenticated vulnerability scanning with this exclusive quiz.Take This Quiz